25706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) eventfd(0xce24) 14:27:35 executing program 1: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, r4, {r1, r2}}, './file0\x00'}) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4) sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000940)={&(0x7f0000000840), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x24, r6, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x404c0c0}, 0x8008041) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000a00)={0xa, &(0x7f0000000980)=[{0x5, 0x5, 0x1, 0x14000000}, {0x6, 0x7, 0x8, 0xd29}, {0x1, 0x3, 0x0, 0xf95}, {0x0, 0x40, 0x9, 0x100}, {0x4, 0x2, 0x1f, 0x7}, {0x8, 0x6, 0x6, 0x3}, {0x7, 0x7, 0x3a, 0xffffffe0}, {0x9, 0x9, 0x7, 0x5}, {0x100, 0x5, 0x3f, 0x49}, {0x0, 0x5, 0x2, 0x3b6}]}) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x24, 0x0, 0x8, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x24}, 0x1, 0x0, 0x0, 0x7}, 0x20000000) fanotify_mark(r0, 0x2, 0x48000000, r0, &(0x7f0000000b40)='./file0/file0\x00') 14:27:35 executing program 4: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, r4, {r1, r2}}, './file0\x00'}) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4) sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000940)={&(0x7f0000000840), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x24, r6, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x404c0c0}, 0x8008041) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000a00)={0xa, &(0x7f0000000980)=[{0x5, 0x5, 0x1, 0x14000000}, {0x6, 0x7, 0x8, 0xd29}, {0x1, 0x3, 0x0, 0xf95}, {0x0, 0x40, 0x9, 0x100}, {0x4, 0x2, 0x1f, 0x7}, {0x8, 0x6, 0x6, 0x3}, {0x7, 0x7, 0x3a, 0xffffffe0}, {0x9, 0x9, 0x7, 0x5}, {0x100, 0x5, 0x3f, 0x49}, {0x0, 0x5, 0x2, 0x3b6}]}) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x24, 0x0, 0x8, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x24}, 0x1, 0x0, 0x0, 0x7}, 0x20000000) fanotify_mark(r0, 0x2, 0x48000000, r0, &(0x7f0000000b40)='./file0/file0\x00') 14:27:35 executing program 0: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, r4, {r1, r2}}, './file0\x00'}) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4) sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000940)={&(0x7f0000000840), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x24, r6, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x404c0c0}, 0x8008041) fanotify_mark(r0, 0x2, 0x48000000, r0, &(0x7f0000000b40)='./file0/file0\x00') [ 48.323451] befs: Unrecognized mount option "\" or missing value [ 48.330199] befs: (loop3): cannot parse mount options [ 48.332398] befs: Unrecognized mount option "\" or missing value [ 48.347986] befs: (loop5): cannot parse mount options [ 48.389864] print_req_error: I/O error, dev loop5, sector 0 14:27:35 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) eventfd(0xce24) 14:27:35 executing program 2: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, r4, {r1, r2}}, './file0\x00'}) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4) sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000940)={&(0x7f0000000840), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x24, r6, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x404c0c0}, 0x8008041) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000a00)={0xa, &(0x7f0000000980)=[{0x5, 0x5, 0x1, 0x14000000}, {0x6, 0x7, 0x8, 0xd29}, {0x1, 0x3, 0x0, 0xf95}, {0x0, 0x40, 0x9, 0x100}, {0x4, 0x2, 0x1f, 0x7}, {0x8, 0x6, 0x6, 0x3}, {0x7, 0x7, 0x3a, 0xffffffe0}, {0x9, 0x9, 0x7, 0x5}, {0x100, 0x5, 0x3f, 0x49}, {0x0, 0x5, 0x2, 0x3b6}]}) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x24, 0x0, 0x8, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x24}, 0x1, 0x0, 0x0, 0x7}, 0x20000000) fanotify_mark(r0, 0x2, 0x48000000, r0, &(0x7f0000000b40)='./file0/file0\x00') 14:27:35 executing program 0: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, r4, {r1, r2}}, './file0\x00'}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4) fanotify_mark(r0, 0x2, 0x48000000, r0, &(0x7f0000000b40)='./file0/file0\x00') 14:27:35 executing program 4: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, r4, {r1, r2}}, './file0\x00'}) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4) sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000940)={&(0x7f0000000840), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x24, r6, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x404c0c0}, 0x8008041) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000a00)={0xa, &(0x7f0000000980)=[{0x5, 0x5, 0x1, 0x14000000}, {0x6, 0x7, 0x8, 0xd29}, {0x1, 0x3, 0x0, 0xf95}, {0x0, 0x40, 0x9, 0x100}, {0x4, 0x2, 0x1f, 0x7}, {0x8, 0x6, 0x6, 0x3}, {0x7, 0x7, 0x3a, 0xffffffe0}, {0x9, 0x9, 0x7, 0x5}, {0x100, 0x5, 0x3f, 0x49}, {0x0, 0x5, 0x2, 0x3b6}]}) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x24, 0x0, 0x8, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x24}, 0x1, 0x0, 0x0, 0x7}, 0x20000000) 14:27:35 executing program 1: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, r4, {r1, r2}}, './file0\x00'}) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4) sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000940)={&(0x7f0000000840), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x24, r6, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x404c0c0}, 0x8008041) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000a00)={0xa, &(0x7f0000000980)=[{0x5, 0x5, 0x1, 0x14000000}, {0x6, 0x7, 0x8, 0xd29}, {0x1, 0x3, 0x0, 0xf95}, {0x0, 0x40, 0x9, 0x100}, {0x4, 0x2, 0x1f, 0x7}, {0x8, 0x6, 0x6, 0x3}, {0x7, 0x7, 0x3a, 0xffffffe0}, {0x9, 0x9, 0x7, 0x5}, {0x100, 0x5, 0x3f, 0x49}, {0x0, 0x5, 0x2, 0x3b6}]}) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x24, 0x0, 0x8, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x24}, 0x1, 0x0, 0x0, 0x7}, 0x20000000) 14:27:35 executing program 0: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, r4, {r1, r2}}, './file0\x00'}) fanotify_mark(r0, 0x2, 0x48000000, r0, &(0x7f0000000b40)='./file0/file0\x00') [ 48.456635] befs: Unrecognized mount option "\" or missing value [ 48.468449] befs: (loop3): cannot parse mount options 14:27:35 executing program 4: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, r4, {r1, r2}}, './file0\x00'}) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4) sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000940)={&(0x7f0000000840), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x24, r6, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x404c0c0}, 0x8008041) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000a00)={0xa, &(0x7f0000000980)=[{0x5, 0x5, 0x1, 0x14000000}, {0x6, 0x7, 0x8, 0xd29}, {0x1, 0x3, 0x0, 0xf95}, {0x0, 0x40, 0x9, 0x100}, {0x4, 0x2, 0x1f, 0x7}, {0x8, 0x6, 0x6, 0x3}, {0x7, 0x7, 0x3a, 0xffffffe0}, {0x9, 0x9, 0x7, 0x5}, {0x100, 0x5, 0x3f, 0x49}, {0x0, 0x5, 0x2, 0x3b6}]}) 14:27:35 executing program 1: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, r4, {r1, r2}}, './file0\x00'}) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4) sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000940)={&(0x7f0000000840), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x24, r6, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x404c0c0}, 0x8008041) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000a00)={0xa, &(0x7f0000000980)=[{0x5, 0x5, 0x1, 0x14000000}, {0x6, 0x7, 0x8, 0xd29}, {0x1, 0x3, 0x0, 0xf95}, {0x0, 0x40, 0x9, 0x100}, {0x4, 0x2, 0x1f, 0x7}, {0x8, 0x6, 0x6, 0x3}, {0x7, 0x7, 0x3a, 0xffffffe0}, {0x9, 0x9, 0x7, 0x5}, {0x100, 0x5, 0x3f, 0x49}, {0x0, 0x5, 0x2, 0x3b6}]}) 14:27:35 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) eventfd(0xce24) 14:27:35 executing program 2: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, r4, {r1, r2}}, './file0\x00'}) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4) sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000940)={&(0x7f0000000840), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x24, r6, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x404c0c0}, 0x8008041) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000a00)={0xa, &(0x7f0000000980)=[{0x5, 0x5, 0x1, 0x14000000}, {0x6, 0x7, 0x8, 0xd29}, {0x1, 0x3, 0x0, 0xf95}, {0x0, 0x40, 0x9, 0x100}, {0x4, 0x2, 0x1f, 0x7}, {0x8, 0x6, 0x6, 0x3}, {0x7, 0x7, 0x3a, 0xffffffe0}, {0x9, 0x9, 0x7, 0x5}, {0x100, 0x5, 0x3f, 0x49}, {0x0, 0x5, 0x2, 0x3b6}]}) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x24, 0x0, 0x8, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x24}, 0x1, 0x0, 0x0, 0x7}, 0x20000000) fanotify_mark(r0, 0x2, 0x48000000, r0, &(0x7f0000000b40)='./file0/file0\x00') 14:27:35 executing program 0: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b}) fanotify_mark(r0, 0x2, 0x48000000, r0, &(0x7f0000000b40)='./file0/file0\x00') 14:27:35 executing program 4: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, r4, {r1, r2}}, './file0\x00'}) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4) sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000940)={&(0x7f0000000840), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x24, r6, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x404c0c0}, 0x8008041) [ 48.599410] befs: Unrecognized mount option "\" or missing value [ 48.607000] befs: (loop5): cannot parse mount options 14:27:35 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:35 executing program 2: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, r4, {r1, r2}}, './file0\x00'}) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4) sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000940)={&(0x7f0000000840), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x24, r6, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x404c0c0}, 0x8008041) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000a00)={0xa, &(0x7f0000000980)=[{0x5, 0x5, 0x1, 0x14000000}, {0x6, 0x7, 0x8, 0xd29}, {0x1, 0x3, 0x0, 0xf95}, {0x0, 0x40, 0x9, 0x100}, {0x4, 0x2, 0x1f, 0x7}, {0x8, 0x6, 0x6, 0x3}, {0x7, 0x7, 0x3a, 0xffffffe0}, {0x9, 0x9, 0x7, 0x5}, {0x100, 0x5, 0x3f, 0x49}, {0x0, 0x5, 0x2, 0x3b6}]}) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x24, 0x0, 0x8, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x24}, 0x1, 0x0, 0x0, 0x7}, 0x20000000) [ 48.646071] befs: Unrecognized mount option "\" or missing value [ 48.653214] befs: (loop3): cannot parse mount options [ 48.680525] print_req_error: I/O error, dev loop5, sector 0 14:27:35 executing program 1: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, r4, {r1, r2}}, './file0\x00'}) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4) sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000940)={&(0x7f0000000840), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x24, r6, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x404c0c0}, 0x8008041) 14:27:35 executing program 4: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, r4, {r1, r2}}, './file0\x00'}) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4) sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000940)={&(0x7f0000000840), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x24, r6, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x404c0c0}, 0x8008041) 14:27:35 executing program 0: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) fanotify_mark(r0, 0x2, 0x48000000, r0, &(0x7f0000000b40)='./file0/file0\x00') 14:27:35 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:35 executing program 0: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) fanotify_mark(r0, 0x2, 0x48000000, r0, &(0x7f0000000b40)='./file0/file0\x00') 14:27:35 executing program 1: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, r4, {r1, r2}}, './file0\x00'}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4) 14:27:35 executing program 2: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, r4, {r1, r2}}, './file0\x00'}) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4) sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000940)={&(0x7f0000000840), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x24, r6, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x404c0c0}, 0x8008041) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000a00)={0xa, &(0x7f0000000980)=[{0x5, 0x5, 0x1, 0x14000000}, {0x6, 0x7, 0x8, 0xd29}, {0x1, 0x3, 0x0, 0xf95}, {0x0, 0x40, 0x9, 0x100}, {0x4, 0x2, 0x1f, 0x7}, {0x8, 0x6, 0x6, 0x3}, {0x7, 0x7, 0x3a, 0xffffffe0}, {0x9, 0x9, 0x7, 0x5}, {0x100, 0x5, 0x3f, 0x49}, {0x0, 0x5, 0x2, 0x3b6}]}) 14:27:35 executing program 4: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, r4, {r1, r2}}, './file0\x00'}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4) 14:27:35 executing program 1: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, r4, {r1, r2}}, './file0\x00'}) 14:27:35 executing program 2: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, r4, {r1, r2}}, './file0\x00'}) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4) sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000940)={&(0x7f0000000840), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x24, r6, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x404c0c0}, 0x8008041) [ 48.871145] befs: Unrecognized mount option "\" or missing value [ 48.877312] befs: (loop5): cannot parse mount options 14:27:36 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:36 executing program 0: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) socket$nl_generic(0x10, 0x3, 0x10) fanotify_mark(r0, 0x2, 0x48000000, r0, &(0x7f0000000b40)='./file0/file0\x00') 14:27:36 executing program 1: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b}) 14:27:36 executing program 2: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, r4, {r1, r2}}, './file0\x00'}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4) 14:27:36 executing program 4: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, r4, {r1, r2}}, './file0\x00'}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4) 14:27:36 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:36 executing program 0: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) fanotify_mark(r0, 0x2, 0x48000000, r0, &(0x7f0000000b40)='./file0/file0\x00') [ 48.919750] print_req_error: I/O error, dev loop5, sector 0 14:27:36 executing program 1: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:36 executing program 2: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4) 14:27:36 executing program 4: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, r4, {r1, r2}}, './file0\x00'}) 14:27:36 executing program 1: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) 14:27:36 executing program 0: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) fanotify_mark(r0, 0x2, 0x48000000, r0, &(0x7f0000000b40)='./file0/file0\x00') [ 49.044908] befs: Unrecognized mount option "\" or missing value [ 49.053756] befs: (loop5): cannot parse mount options 14:27:36 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) eventfd(0x8) 14:27:36 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:36 executing program 2: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4) 14:27:36 executing program 1: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) 14:27:36 executing program 0: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) fanotify_mark(r0, 0x2, 0x48000000, r0, &(0x7f0000000b40)='./file0/file0\x00') 14:27:36 executing program 4: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, r4, {r1, r2}}, './file0\x00'}) 14:27:36 executing program 0: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) fanotify_mark(r0, 0x2, 0x48000000, r0, &(0x7f0000000b40)='./file0/file0\x00') 14:27:36 executing program 4: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b}) 14:27:36 executing program 1: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) 14:27:36 executing program 2: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4) 14:27:36 executing program 1: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) 14:27:36 executing program 2: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4) 14:27:36 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) 14:27:36 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) eventfd(0xce24) 14:27:36 executing program 1: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) 14:27:36 executing program 4: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b}) 14:27:36 executing program 2: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), 0xffffffffffffffff) 14:27:36 executing program 0: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r1, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fanotify_mark(r0, 0x2, 0x48000000, r0, &(0x7f0000000b40)='./file0/file0\x00') [ 49.241519] befs: Unrecognized mount option "\" or missing value [ 49.247685] befs: (loop5): cannot parse mount options 14:27:36 executing program 1: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) 14:27:36 executing program 0: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) fanotify_mark(r0, 0x2, 0x48000000, r0, &(0x7f0000000b40)='./file0/file0\x00') 14:27:36 executing program 2: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), 0xffffffffffffffff) 14:27:36 executing program 4: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:36 executing program 0: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) fanotify_mark(r0, 0x2, 0x48000000, r0, &(0x7f0000000b40)='./file0/file0\x00') 14:27:36 executing program 1: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) 14:27:36 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) 14:27:36 executing program 2: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), 0xffffffffffffffff) 14:27:36 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) eventfd(0xce24) 14:27:36 executing program 1: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r1, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r1, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) 14:27:36 executing program 4: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:36 executing program 0: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) fanotify_mark(0xffffffffffffffff, 0x2, 0x48000000, 0xffffffffffffffff, &(0x7f0000000b40)='./file0/file0\x00') 14:27:36 executing program 2: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), 0xffffffffffffffff) [ 49.413139] befs: Unrecognized mount option "\" or missing value [ 49.427345] befs: (loop5): cannot parse mount options 14:27:36 executing program 1: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) 14:27:36 executing program 4: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:36 executing program 0: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) fanotify_mark(0xffffffffffffffff, 0x2, 0x48000000, 0xffffffffffffffff, &(0x7f0000000b40)='./file0/file0\x00') 14:27:36 executing program 2: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), 0xffffffffffffffff) 14:27:36 executing program 1: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) 14:27:36 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) 14:27:36 executing program 2: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), 0xffffffffffffffff) 14:27:36 executing program 1: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) 14:27:36 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) eventfd(0xce24) 14:27:36 executing program 0: fanotify_mark(0xffffffffffffffff, 0x2, 0x48000000, 0xffffffffffffffff, &(0x7f0000000b40)='./file0/file0\x00') 14:27:36 executing program 4: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:36 executing program 2: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r1, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), 0xffffffffffffffff) 14:27:36 executing program 0: fanotify_mark(0xffffffffffffffff, 0x0, 0x48000000, 0xffffffffffffffff, &(0x7f0000000b40)='./file0/file0\x00') [ 49.592951] befs: Unrecognized mount option "\" or missing value [ 49.603899] befs: (loop5): cannot parse mount options 14:27:36 executing program 1: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) 14:27:36 executing program 4: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:36 executing program 2: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), 0xffffffffffffffff) 14:27:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) 14:27:36 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) 14:27:36 executing program 4: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:36 executing program 0: fanotify_mark(0xffffffffffffffff, 0x0, 0x48000000, 0xffffffffffffffff, &(0x7f0000000b40)='./file0/file0\x00') 14:27:36 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) eventfd(0x8) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) eventfd(0xce24) 14:27:36 executing program 2: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), 0xffffffffffffffff) 14:27:36 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) 14:27:36 executing program 4: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) set_tid_address(&(0x7f0000000540)) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:37 executing program 2: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) connect$l2tp(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), 0xffffffffffffffff) 14:27:37 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) [ 49.781592] befs: Unrecognized mount option "\" or missing value [ 49.787763] befs: (loop5): cannot parse mount options 14:27:37 executing program 0: fanotify_mark(0xffffffffffffffff, 0x0, 0x48000000, 0xffffffffffffffff, &(0x7f0000000b40)='./file0/file0\x00') 14:27:37 executing program 2: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) connect$l2tp(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), 0xffffffffffffffff) 14:27:37 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) 14:27:37 executing program 0: fanotify_mark(0xffffffffffffffff, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000b40)='./file0/file0\x00') 14:27:37 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) 14:27:37 executing program 4: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:37 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) eventfd(0x8) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) eventfd(0xce24) 14:27:37 executing program 0: fanotify_mark(0xffffffffffffffff, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000b40)='./file0/file0\x00') 14:27:37 executing program 2: connect$l2tp(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), 0xffffffffffffffff) 14:27:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, 0x0, 0x20000040) 14:27:37 executing program 4: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, 0x0, 0x20000040) 14:27:37 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) eventfd(0x8) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) eventfd(0xce24) 14:27:37 executing program 0: fanotify_mark(0xffffffffffffffff, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000b40)='./file0/file0\x00') 14:27:37 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) 14:27:37 executing program 2: connect$l2tp(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), 0xffffffffffffffff) 14:27:37 executing program 4: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, 0x0, 0x20000040) 14:27:37 executing program 0: fanotify_mark(0xffffffffffffffff, 0x2, 0x48000000, 0xffffffffffffffff, 0x0) 14:27:37 executing program 4: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:37 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) eventfd(0xce24) 14:27:37 executing program 2: connect$l2tp(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) 14:27:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) 14:27:37 executing program 0: connect$l2tp(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), 0xffffffffffffffff) 14:27:37 executing program 4: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:37 executing program 4: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r1, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r1, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r1, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:37 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) 14:27:37 executing program 2: connect$l2tp(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) 14:27:37 executing program 0: connect$l2tp(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), 0xffffffffffffffff) 14:27:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) 14:27:37 executing program 4: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r1, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r1, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r1, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:37 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) eventfd(0xce24) 14:27:37 executing program 2: connect$l2tp(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) 14:27:37 executing program 4: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:37 executing program 0: connect$l2tp(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), 0xffffffffffffffff) 14:27:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) 14:27:37 executing program 2: connect$l2tp(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) 14:27:37 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) eventfd(0xce24) 14:27:37 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) 14:27:37 executing program 2: connect$l2tp(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) 14:27:37 executing program 4: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580), 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) 14:27:37 executing program 0: syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), 0xffffffffffffffff) 14:27:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580), 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) 14:27:37 executing program 4: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:37 executing program 2: connect$l2tp(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) 14:27:37 executing program 0: syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) 14:27:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580), 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) 14:27:37 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) 14:27:37 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) eventfd(0xce24) 14:27:37 executing program 4: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, 0x0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:37 executing program 2: syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) 14:27:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) 14:27:37 executing program 0: syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) 14:27:37 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) 14:27:37 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) eventfd(0xce24) 14:27:37 executing program 4: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, 0x0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) 14:27:37 executing program 0: syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) 14:27:37 executing program 4: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, 0x0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) 14:27:37 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) eventfd(0xce24) 14:27:37 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) 14:27:37 executing program 4: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={0x0}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) 14:27:37 executing program 4: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:37 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) eventfd(0xce24) 14:27:37 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) eventfd(0xce24) 14:27:37 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) 14:27:37 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) eventfd(0xce24) 14:27:37 executing program 5: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) 14:27:37 executing program 4: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:37 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) eventfd(0xce24) [ 50.673721] Zero length message leads to an empty skb 14:27:37 executing program 4: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:37 executing program 5: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) 14:27:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={0x0}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) 14:27:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={0x0}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) 14:27:37 executing program 5: openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) 14:27:38 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) eventfd(0xce24) 14:27:38 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) eventfd(0xce24) 14:27:38 executing program 4: recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:38 executing program 5: openat$incfs(0xffffffffffffffff, 0x0, 0x1, 0x123) 14:27:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x0, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) 14:27:38 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) eventfd(0xce24) 14:27:38 executing program 5: openat$incfs(0xffffffffffffffff, 0x0, 0x1, 0x123) 14:27:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) [ 50.810390] befs: Unrecognized mount option "\" or missing value [ 50.816570] befs: (loop0): cannot parse mount options 14:27:38 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) 14:27:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) 14:27:38 executing program 5: openat$incfs(0xffffffffffffffff, 0x0, 0x1, 0x123) 14:27:38 executing program 5: openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x0, 0x123) 14:27:38 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:38 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) eventfd(0xce24) 14:27:38 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:38 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) eventfd(0xce24) 14:27:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) 14:27:38 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:38 executing program 5: openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x0, 0x0) 14:27:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) 14:27:38 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:38 executing program 5: r0 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:38 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) 14:27:38 executing program 5: r0 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:38 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:38 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x20000040) 14:27:38 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:38 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) eventfd(0xce24) 14:27:38 executing program 5: r0 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) 14:27:38 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:38 executing program 5: r0 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) 14:27:38 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) 14:27:38 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) 14:27:38 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) eventfd(0xce24) 14:27:38 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:38 executing program 5: r0 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 14:27:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) 14:27:38 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:38 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) eventfd(0xce24) 14:27:38 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) [ 51.310420] befs: Unrecognized mount option "\" or missing value [ 51.316809] befs: (loop0): cannot parse mount options 14:27:38 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:38 executing program 5: r0 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) 14:27:38 executing program 1: r0 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 14:27:38 executing program 5: syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) 14:27:38 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:38 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:38 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:38 executing program 1: r0 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 14:27:38 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) eventfd(0x8) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:38 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:38 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500)) r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) eventfd(0xce24) 14:27:38 executing program 5: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:38 executing program 1: r0 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 14:27:38 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:38 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) eventfd(0xce24) 14:27:38 executing program 5: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:38 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:38 executing program 5: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:38 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) eventfd(0xce24) 14:27:38 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, 0x0, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:38 executing program 5: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) 14:27:38 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500)) r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) eventfd(0xce24) 14:27:38 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) eventfd(0xce24) 14:27:38 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) eventfd(0x8) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:38 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) eventfd(0x8) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:38 executing program 5: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) 14:27:38 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, 0x0, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:38 executing program 5: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 14:27:38 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, 0x0, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:38 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) eventfd(0xce24) 14:27:38 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) eventfd(0xce24) 14:27:38 executing program 5: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 14:27:38 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:39 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:39 executing program 5: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) 14:27:39 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500)) r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) eventfd(0xce24) 14:27:39 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:39 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:39 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:39 executing program 5: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) 14:27:39 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) eventfd(0x8) eventfd(0xce24) 14:27:39 executing program 5: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) 14:27:39 executing program 5: syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) 14:27:39 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:39 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:39 executing program 5: syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) 14:27:39 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:39 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) eventfd(0xce24) 14:27:39 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:39 executing program 5: syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) 14:27:39 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:39 executing program 5: syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) 14:27:39 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) eventfd(0x8) eventfd(0xce24) 14:27:39 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:39 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:39 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:39 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) eventfd(0xce24) 14:27:39 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:39 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:39 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:39 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x0, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:39 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:39 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) eventfd(0xce24) 14:27:39 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:39 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) eventfd(0x8) eventfd(0xce24) 14:27:39 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:39 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:39 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r1, &(0x7f0000000500)) r2 = openat$incfs(r1, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r3 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r3, 0x4}) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) eventfd(0xce24) 14:27:39 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:39 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:39 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:39 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r1, &(0x7f0000000500)) r2 = openat$incfs(r1, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r3 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r3, 0x4}) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) eventfd(0xce24) [ 52.250917] befs: Unrecognized mount option "\" or missing value [ 52.257099] befs: (loop0): cannot parse mount options 14:27:39 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:39 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x20000040) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:39 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:39 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r1, &(0x7f0000000500)) r2 = openat$incfs(r1, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r3 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r3, 0x4}) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) eventfd(0xce24) 14:27:39 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:39 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:39 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:39 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r1, &(0x7f0000000500)) r2 = openat$incfs(r1, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r3 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r3, 0x4}) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) eventfd(0xce24) 14:27:39 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:39 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) eventfd(0x8) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:39 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:39 executing program 3: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r0, &(0x7f0000000500)) r1 = openat$incfs(r0, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r2 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r2, 0x4}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0xce24) 14:27:39 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:39 executing program 3: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r0, &(0x7f0000000500)) r1 = openat$incfs(r0, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r2 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r2, 0x4}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0xce24) 14:27:39 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:39 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, 0x0, 0x0) 14:27:39 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:39 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, 0x0, 0x0) 14:27:39 executing program 3: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r0, &(0x7f0000000500)) r1 = openat$incfs(r0, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r2 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r2, 0x4}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0xce24) 14:27:39 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:39 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:39 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) eventfd(0x8) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:39 executing program 3: r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r0, &(0x7f0000000500)) r1 = openat$incfs(r0, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r2 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r2, 0x4}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0xce24) 14:27:39 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, 0x0, 0x0) 14:27:39 executing program 3: r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r0, &(0x7f0000000500)) r1 = openat$incfs(r0, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r2 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r2, 0x4}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0xce24) 14:27:39 executing program 3: r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r0, &(0x7f0000000500)) r1 = openat$incfs(r0, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r2 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r2, 0x4}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0xce24) 14:27:39 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:39 executing program 3: r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r0, &(0x7f0000000500)) r1 = openat$incfs(r0, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r2 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r2, 0x4}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0xce24) 14:27:39 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:39 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:39 executing program 3: r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0) timerfd_gettime(r0, &(0x7f0000000500)) r1 = openat$incfs(r0, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r2 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r2, 0x4}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0xce24) 14:27:39 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:39 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) eventfd(0x8) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:39 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:39 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:39 executing program 3: r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500)) r1 = openat$incfs(r0, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r2 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r2, 0x4}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0xce24) 14:27:40 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680), 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:40 executing program 3: r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) r1 = openat$incfs(r0, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r2 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r2, 0x4}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0xce24) 14:27:40 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680), 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:40 executing program 3: r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r2 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r2, 0x4}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0xce24) 14:27:40 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:40 executing program 3: r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) r1 = openat$incfs(0xffffffffffffffff, 0x0, 0x1, 0x123) r2 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r2, 0x4}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0xce24) 14:27:40 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680), 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:40 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:40 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:40 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:40 executing program 3: r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) r1 = openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x123) r2 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r2, 0x4}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0xce24) 14:27:40 executing program 3: r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) r1 = openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r2, 0x4}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0xce24) [ 52.922990] befs: Unrecognized mount option "\" or missing value [ 52.922997] befs: (loop0): cannot parse mount options 14:27:40 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:40 executing program 3: r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) r1 = openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r2, 0x4}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0xce24) 14:27:40 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) eventfd(0x8) 14:27:40 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:40 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:40 executing program 3: r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = eventfd(0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r1, 0x4}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0xce24) 14:27:40 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:40 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:40 executing program 3: r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) eventfd(0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0xce24) 14:27:40 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:40 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={0x0}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:40 executing program 3: openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) eventfd(0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) eventfd(0xce24) 14:27:40 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={0x0}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:40 executing program 3: openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) eventfd(0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) eventfd(0x0) 14:27:40 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) eventfd(0x8) 14:27:40 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={0x0}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:40 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:40 executing program 3: syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={0x0}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:40 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:40 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:40 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:40 executing program 3: syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={0x0}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:40 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, 0x0, 0x0, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:40 executing program 3: syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={0x0}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:40 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, 0x0, 0x0, 0x0, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:40 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:40 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) eventfd(0x8) 14:27:40 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:40 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:40 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:40 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:40 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x5c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}]}, 0x5c}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:40 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x54, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}]}, 0x54}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:40 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:40 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:40 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:40 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x40, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:40 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x34, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:40 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:40 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}]}, 0x2c}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:40 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:40 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:40 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:40 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:40 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:40 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:40 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:40 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x5}, 0x0) 14:27:40 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x14}, 0x14}}, 0x0) 14:27:40 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:40 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x14}, 0x14}}, 0x0) 14:27:40 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:41 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:41 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:41 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:41 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:41 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) 14:27:41 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:41 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:41 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:41 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:41 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) 14:27:41 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:41 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:41 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:41 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:41 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:41 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) 14:27:41 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:41 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:41 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) 14:27:41 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:41 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:41 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 14:27:41 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:41 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:41 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:41 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) 14:27:41 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:41 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 14:27:42 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:42 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) 14:27:42 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:42 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:42 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:42 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 14:27:42 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:42 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500)) r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 14:27:42 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:42 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:42 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:42 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500)) r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 14:27:42 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:42 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:42 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:42 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:42 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:42 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:42 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500)) r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 14:27:42 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:42 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:42 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:42 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:42 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:42 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:42 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:42 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:42 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:42 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:42 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:42 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500)) r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) 14:27:43 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:43 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:43 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:43 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:43 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500)) r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) 14:27:43 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:43 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:43 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:43 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:43 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:43 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:43 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:43 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:43 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:43 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500)) r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) 14:27:43 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:43 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) 14:27:43 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:43 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) [ 56.248384] befs: Unrecognized mount option "\" or missing value [ 56.269336] befs: (loop0): cannot parse mount options 14:27:43 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:43 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:43 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:43 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:43 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) 14:27:43 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:43 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) 14:27:43 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:43 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) [ 56.405931] befs: Unrecognized mount option "\" or missing value [ 56.412702] befs: (loop0): cannot parse mount options 14:27:43 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:43 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) [ 56.471266] print_req_error: I/O error, dev loop0, sector 0 14:27:43 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:43 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:43 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:43 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500)) r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:43 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:43 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:43 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:43 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500)) r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:43 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:43 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:43 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:43 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:43 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) [ 56.685423] befs: Unrecognized mount option "\" or missing value [ 56.702065] befs: (loop0): cannot parse mount options 14:27:43 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:43 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500)) r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:43 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:44 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) 14:27:44 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:44 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) 14:27:44 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) 14:27:44 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:44 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:44 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:44 executing program 1: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:44 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 14:27:44 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:44 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:44 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:44 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:44 executing program 1: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:44 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 14:27:44 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:44 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:44 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:44 executing program 1: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:44 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:44 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:44 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 14:27:44 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:44 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:44 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:44 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:44 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:44 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:44 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:44 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:44 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:44 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:44 executing program 2: ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:44 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:44 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:44 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:44 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:44 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:44 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:44 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:45 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:45 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:45 executing program 2: ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:45 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:45 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:45 executing program 1: ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:45 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:45 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:45 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:45 executing program 2: ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:45 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:45 executing program 1: ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:45 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:45 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:45 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:45 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:45 executing program 1: ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:45 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:45 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:45 executing program 5: ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) 14:27:45 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:45 executing program 1: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:45 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:45 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:45 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:45 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:45 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:45 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:45 executing program 5: ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) 14:27:45 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:45 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:45 executing program 1: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:45 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:45 executing program 5: ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) 14:27:45 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:46 executing program 1: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:46 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:46 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:46 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:46 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:46 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:46 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:46 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:46 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:46 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:46 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:46 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:46 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:46 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:46 executing program 4: ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:46 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:46 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:46 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:46 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:46 executing program 4: ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:46 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:46 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:46 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:46 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:46 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:46 executing program 4: ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:46 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:46 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:46 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:46 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:46 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:46 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:46 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:46 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:46 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:46 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:46 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:46 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:46 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:46 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:46 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:46 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:46 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:46 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) [ 59.755599] befs: Unrecognized mount option "\" or missing value [ 59.774085] befs: (loop0): cannot parse mount options 14:27:47 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:47 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:47 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:47 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:47 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:47 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:47 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:47 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:47 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:47 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:47 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:47 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:47 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:47 executing program 3: ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:47 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:47 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:47 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:47 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:47 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:47 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:47 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:47 executing program 3: ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:47 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:47 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:47 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, 0x0, 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:47 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:47 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:47 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, 0x0, 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:47 executing program 3: ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:47 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:47 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:47 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:47 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, 0x0, 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:47 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:47 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:47 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:47 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x0, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:47 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:47 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:47 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:47 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:47 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x0, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:47 executing program 0: ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:47 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:47 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:48 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:48 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:48 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:48 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x0, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:48 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:48 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:48 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:48 executing program 0: ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:48 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:48 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:48 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:48 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:48 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:48 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:48 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:48 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:48 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:48 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, 0x0, 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:48 executing program 0: ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:48 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:48 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:48 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:48 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:48 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:48 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, 0x0, 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:48 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:48 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:48 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:48 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) 14:27:48 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:48 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:48 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, 0x0, 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:48 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:48 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:48 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:48 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) 14:27:48 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:49 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:49 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x0, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:49 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:49 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r4 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4}) 14:27:49 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:49 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:49 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, 0x0) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:49 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:49 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:49 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x0, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:49 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, 0x0, 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:49 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, 0x0) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:49 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:49 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:49 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x0, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:49 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:49 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, 0x0, 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:49 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:49 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, 0x0) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:49 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:49 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x0) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:49 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:49 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:49 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:49 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:49 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, 0x0, 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:49 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x0) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:49 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, 0x0, 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:49 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:49 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:49 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x0, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:49 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, 0x0, 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) [ 62.669088] befs: Unrecognized mount option "\" or missing value [ 62.690135] befs: (loop0): cannot parse mount options 14:27:49 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x0) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:49 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:49 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:49 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:50 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, 0x0, 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:50 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x0, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:50 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:50 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) [ 62.842865] befs: Unrecognized mount option "\" or missing value [ 62.849971] befs: (loop0): cannot parse mount options 14:27:50 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:50 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x0, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:50 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:50 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:50 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, 0x0) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:50 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:50 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x0, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:50 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x0, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:50 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:50 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, 0x0) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:50 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:50 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x0, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:50 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:50 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:50 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, 0x0) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:50 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:50 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:50 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:50 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:50 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:50 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:50 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:50 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:50 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:50 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:50 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:50 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:50 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:50 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:50 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:50 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:50 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:50 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r2, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 14:27:50 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:51 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, 0x0, 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:51 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x0, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:51 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:51 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, 0x0, 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:51 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:51 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, 0x0, 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:51 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:51 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x0, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) [ 64.022694] befs: Unrecognized mount option "\" or missing value [ 64.034206] befs: (loop0): cannot parse mount options 14:27:51 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) eventfd(0xce24) 14:27:51 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:51 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, 0x0, 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:51 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, 0x0) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) 14:27:51 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, 0x0, 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:51 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, 0x0, 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:51 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, 0x0) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) r5 = eventfd(0x8) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4}) 14:27:51 executing program 2: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x0, 0x0, 0x1, 0x975, 0x70}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b}) timerfd_gettime(r3, &(0x7f0000000500)) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 14:27:51 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, 0x0) timerfd_gettime(r3, &(0x7f0000000500)) r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4}) [ 64.287826] kasan: CONFIG_KASAN_INLINE enabled [ 64.292500] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 64.302384] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 64.308614] Modules linked in: [ 64.311843] CPU: 0 PID: 10969 Comm: systemd-udevd Not tainted 4.14.288-syzkaller #0 [ 64.319616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 64.328955] task: ffff88809ba7e000 task.stack: ffff88809f5b0000 [ 64.335001] RIP: 0010:kobject_uevent_env+0xb2/0xf30 [ 64.339995] RSP: 0018:ffff88809f5b7c00 EFLAGS: 00010206 [ 64.345348] RAX: 0000000000000018 RBX: 0000000000000002 RCX: 1ffff1101374fd20 [ 64.352601] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00000000000000c0 [ 64.359854] RBP: ffff88808f484b90 R08: ffffffff8b9ba560 R09: 0000000000000003 [ 64.367104] R10: 0000000000000000 R11: ffff88809ba7e000 R12: 00000000000000a0 [ 64.374354] R13: dffffc0000000000 R14: ffff88808f484a88 R15: 00000000000000a0 [ 64.381605] FS: 00007f1cdd1df8c0(0000) GS:ffff8880ba400000(0000) knlGS:0000000000000000 [ 64.389807] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 64.395689] CR2: 00007f94bf0fe028 CR3: 000000009955b000 CR4: 00000000003406f0 [ 64.402945] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 64.410241] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 64.417485] Call Trace: [ 64.420053] ? lock_downgrade+0x740/0x740 [ 64.424183] loop_clr_fd+0x59f/0xc20 [ 64.427882] lo_release+0xff/0x190 [ 64.431399] ? loop_clr_fd+0xc20/0xc20 [ 64.435260] __blkdev_put+0x5aa/0x800 [ 64.439041] ? revalidate_disk+0x1f0/0x1f0 [ 64.443252] ? locks_remove_file+0x2cd/0x420 [ 64.447636] ? blkdev_put+0x75/0x4c0 [ 64.451329] ? blkdev_put+0x4c0/0x4c0 [ 64.455106] blkdev_close+0x86/0xb0 [ 64.458733] __fput+0x25f/0x7a0 [ 64.461995] task_work_run+0x11f/0x190 [ 64.465877] exit_to_usermode_loop+0x1ad/0x200 [ 64.470561] do_syscall_64+0x4a3/0x640 [ 64.474426] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 64.479590] RIP: 0033:0x7f1cdc325270 [ 64.483276] RSP: 002b:00007ffd9282aa08 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 64.490960] RAX: 0000000000000000 RBX: 0000000000000007 RCX: 00007f1cdc325270 [ 64.498203] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 64.505450] RBP: 00007f1cdd1df710 R08: 00005618f1495d90 R09: 00005618f1495b00 [ 64.512801] R10: 00007f1cdd1df8c0 R11: 0000000000000246 R12: 0000000000000000 [ 64.520048] R13: 00005618f1486900 R14: 0000000000000003 R15: 000000000000000e [ 64.527732] Code: 03 42 80 3c 28 00 0f 85 dd 0b 00 00 4d 8b 64 24 18 4d 85 e4 0f 84 fa 0b 00 00 e8 ea 56 57 fa 49 8d 7c 24 20 48 89 f8 48 c1 e8 03 <42> 80 3c 28 00 0f 85 d4 0b 00 00 49 8b 6c 24 20 48 85 ed 74 b0 [ 64.546890] RIP: kobject_uevent_env+0xb2/0xf30 RSP: ffff88809f5b7c00 [ 64.554144] ---[ end trace 81f7805df468fdd7 ]--- [ 64.559003] Kernel panic - not syncing: Fatal exception [ 64.564523] Kernel Offset: disabled [ 64.568136] Rebooting in 86400 seconds..