x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) 12:44:02 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000021c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "df47000020000000e26631786991048a370080"}) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0xee) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000080)=0xa) 12:44:02 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0x40) setsockopt$inet_mreqsrc(r0, 0x0, 0x25, &(0x7f0000000440)={@multicast2, @loopback, @empty}, 0xc) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0x40) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000440)={@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @empty}, 0x6) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @local, 0x1, 0x7, [@multicast1, @loopback, @loopback, @private=0xa010102, @dev={0xac, 0x14, 0x14, 0x24}, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2]}, 0x2c) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r2, &(0x7f0000000140)="b20a5313713291e00a8970574f", 0xd, 0x80, &(0x7f0000000200)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYRESOCT=r0], &(0x7f0000000000)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r3}, 0x10) r4 = fsopen(&(0x7f0000000380)='pipefs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r4, 0x6, 0x0, 0x0, 0x0) close_range(r4, 0xffffffffffffffff, 0x0) 12:44:08 executing program 1: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r0, &(0x7f0000000180)=[{0x0}, {&(0x7f0000000040)=""/55, 0x37}], 0x2) 12:44:08 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @remote}, @in6=@dev, 0x0, 0xfffc, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x33}, 0x0, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0xe8) sendmmsg(r0, &(0x7f00000001c0)=[{{&(0x7f0000004e80)=@in6={0xa, 0x4e24, 0x0, @remote}, 0x80, 0x0}}], 0x1, 0x0) 12:44:08 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000040)={0x0, 0x0, 0x8}) 12:44:08 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001500)={0x10, 0x2, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x7a}, @exit], &(0x7f0000001280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYBLOB="0000000000090000286574680000000000000000766f12061e1d63b52aa96ff2f65abb239f996d16c45fcc2f7560756e9466d2620e2bff983387632778288b5ecc44326f2c38"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2400000025000100"/20, @ANYRES32=r1, @ANYBLOB="000095e0a451c7aa3eb90000996ad8014d4d64859ad9a50afbf7175c5702d7c93a9af40d311993ec631e2e98aeb20871845e1c389ef30b6216b4373fc17bf6dc0e44fe37b0bb5f7679949d6377b4347375c0dfcd35f92dfa5a9099b390c9351d60bfbfbfbd4e65ffbd5adb94c63e722839f6e06d1bc22624b20dfdcd38fdcf8108fd83d0288535c49aa3396bc36d20a3bd4b3cd775cd1e16e601197a28162c8fedc3b4f8448a15de5f5e8256297c4802de74345d95043dbca0eb7672ab00ec9b3ebca5fcfabf40f99d26722f653700"/221], 0x24}}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/packet\x00') preadv(r2, &(0x7f0000003b40)=[{&(0x7f00000029c0)=""/73, 0x49}], 0x3b, 0x0, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/packet\x00') preadv(r3, &(0x7f0000003b40)=[{&(0x7f00000029c0)=""/73, 0x49}], 0x3b, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/packet\x00') preadv(r5, &(0x7f0000003b40)=[{&(0x7f00000029c0)=""/73, 0x49}], 0x3b, 0x0, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/packet\x00') r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/packet\x00') preadv(r7, &(0x7f0000003b40)=[{&(0x7f00000029c0)=""/73, 0x49}], 0x3b, 0x0, 0x0) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/packet\x00') preadv(r8, &(0x7f0000003b40)=[{&(0x7f00000029c0)=""/73, 0x49}], 0x3b, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0xb, 0x7, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb2ad, 0x0, 0x0, 0x0, 0x80}, [@ldst={0x3, 0x0, 0x6, 0x7, 0x5, 0x4, 0x10}, @ldst={0x3, 0x2, 0x1, 0xa, 0x0, 0x40, 0x8}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x1}]}, &(0x7f0000000180)='syzkaller\x00', 0x1ff, 0xe4, &(0x7f0000000480)=""/228, 0x40f00, 0x8, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x4, 0xb, 0x0, 0x9}, 0x10, 0x0, r0, 0x0, &(0x7f00000002c0)=[r2, 0x1, r3, r4, r5, r6, r7, r8]}, 0x80) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6_vti0\x00', r1, 0x4, 0x0, 0x0, 0x0, 0x0, @dev, @loopback={0x120e, 0x460c6}}}) r9 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r9, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r10 = socket$nl_route(0x10, 0x3, 0x0) r11 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r11, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route_sched(r10, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000980)=@delchain={0x24, 0x25, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r12, {0x0, 0xffff}, {0x0, 0xffff}}}, 0x24}}, 0x0) 12:44:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) 12:44:08 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000021c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "df47000020000000e26631786991048a370080"}) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0xee) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000080)=0xa) 12:44:08 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000008c0)=@newqdisc={0x44, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x5, 0x2, @TCA_HFSC_RSC={0x10}}}]}, 0x44}}, 0x0) 12:44:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a01010000000000000000020000000900010073797a3000000000080002400000000068000000030a01020000000000000000020000000900010073797a30000000000900010073797a30000000003900030091abc12404cf37"], 0xb8}}, 0x0) 12:44:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) 12:44:08 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000834c0000000000000000000000000000000000000000000000000000fa0061233d0ab81bd5a272720056b4e048622b460405c6df101e7060be7e57e65fc829944265ea90fb44571f228d0d66423306c12a76b03d75581cee8878a85dc9efd690d18f5b66ee3b0246fa90d286351ab78a77330f7311eebf3849bc278a038b87b58b86c907963b8203b4531b2f2b0e3ffb86af63dcb4171e9b1d114f37b4385c915a4fa0f2bf81860a0df4d37082e98e0a10f49d1d2193d4002bbb5893f6"], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x91, 0x0, &(0x7f00000000c0)) 12:44:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) 12:44:08 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, 0x0, &(0x7f0000000140)) [ 2782.421374][ T2032] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 12:44:16 executing program 1: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r0, &(0x7f0000000180)=[{0x0}, {&(0x7f0000000040)=""/55, 0x37}], 0x2) 12:44:16 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x6, &(0x7f0000000000)=@framed={{}, [@generic={0xbc}, @map_idx]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x1009, &(0x7f0000001240)=""/4105, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x22) 12:44:16 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfe37}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000300)="b907ef19edfff007049e0ff0888e", 0x0, 0x6, 0x18000000, 0x0, 0x0, 0x0, 0x0}, 0x48) 12:44:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) 12:44:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@ipmr_delroute={0x24, 0x18, 0x11, 0x0, 0x0, {0x2}, [@RTA_SRC={0x8, 0x801e, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x24}}, 0x0) 12:44:16 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000021c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "df47000020000000e26631786991048a370080"}) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0xee) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000080)=0xa) 12:44:16 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETS2(r0, 0x5441, 0x0) 12:44:16 executing program 0: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000)=@gcm_128={{}, "1154c45d742b48a7", "987049cf98562ebb3276b3fccca7727b", "5319dd11", "b4ec74233297f49e"}, 0x28) bind$inet(r0, &(0x7f0000000240)={0x2, 0x0, @broadcast}, 0x10) 12:44:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) 12:44:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x101000, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'dummy0\x00', 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000180)) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet6(0xa, 0x80003, 0x6b) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r5, &(0x7f0000000240)={0x11, 0x0, r6}, 0x14) getsockname$packet(r5, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x300}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x44}}, 0x0) 12:44:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) 12:44:16 executing program 0: pipe(&(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f00000000c0)='\x00\xc2\xea\x99\xbb\x1c\xf8jw\x97\x05\xa3\xa2\'\xdd\xe4q\xbf\t\x8c\xe0\x19\xe5\xbcJ6\xfc\xa8\xcdj\xc1F\x02\x93\xca`\x8e\x00\x00\x00\x00\x00\x00\x00\x00\x00\b \xff\x13\x96\xe3?\xdfH\x8c\xe4V\xe2\xfe\v8\x04\xa5\xb9\xc4:\xf3\xf6y_w\xd8\xcf\x90k\x05\x00\xf9\x1e\xe8m\xec\x12\xa015\xc2\xb3u|K\x111\xd4\f8\xeb\x18\xad\xbb!1\x85\x96P\x1b\xa1\x9a\x81\xf8\xb1\xecB)\xe5\xaa7\xfe\xdd,_D\xe5|\xb1j^\xaec}\x1a\xb4\x17\xafP\x85I\xd5\xa0I\xb0\xaf\xb5\x8b\\\x05\xd7g\xcbV\x8e\xd0\xac\x87I7\xbd\xc6\x9bI\x92\xb2\x87.\xb3\x1fs\xe7%\xdd+\r\xb4\x117\xa7ei~\xb8\x16\xd1P\xf2\x84\x89K\x16\xd0F|\xa3\x89\xc9~9\x00\x00\x00\x00\x00\x00\x00', 0x0) write(r1, &(0x7f0000000280)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568d85d05667190ba40ed59ac4c015a156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) [ 2790.781254][ T2066] macvtap1: entered promiscuous mode [ 2790.786796][ T2066] macvtap1: entered allmulticast mode [ 2790.793155][ T2066] dummy0: entered promiscuous mode [ 2790.798536][ T2066] dummy0: entered allmulticast mode [ 2790.805361][ T2066] team0: Device macvtap1 failed to register rx_handler [ 2790.812671][ T2066] dummy0: left allmulticast mode [ 2790.817961][ T2066] dummy0: left promiscuous mode 12:44:20 executing program 1: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r0, &(0x7f0000000180)=[{0x0}, {&(0x7f0000000040)=""/55, 0x37}], 0x2) 12:44:20 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xc, &(0x7f0000000000)=[{&(0x7f0000000300)="d800000018008111e00212ba0d8105040a02240003020000067c55a1bc001200b8000699030000000500150e02008178a8000500050001400200000901ac040000d67f6f94007100a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d7a5025ccca262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e970300000000000000000000000000000000000000008dc5fb510162", 0xd8}], 0x1}, 0x0) 12:44:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) 12:44:20 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @remote}, {0xa, 0x0, 0x0, @ipv4}, r1}}, 0x48) 12:44:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x101000, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'dummy0\x00', 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000180)) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet6(0xa, 0x80003, 0x6b) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r5, &(0x7f0000000240)={0x11, 0x0, r6}, 0x14) getsockname$packet(r5, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x300}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x44}}, 0x0) 12:44:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000021c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "df47000020000000e26631786991048a370080"}) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0xee) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000080)=0xa) 12:44:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_VERDICT(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x1, 0x3, 0x801}, 0x14}}, 0x0) 12:44:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$eJzs3T9oO2UYB/DvXRJ/9g9SdREEFUREC6VugktdFApSioigQkXERWmF2uLWOrk46KzSyaWIm9VRuhQXRXCq2qEughYHi4OCJ8m1Um1EMTUn3ucDl9wl997zHrnvkyxHArTWTJKFJJ0ks0l6SYqLO9xRLzNnmzsTBytJVT36fTHYr96unY+bSrKd5P4k+2WR57vJ5t6Txz8ePnz3axu9u97Ze2JirCd55uT46JHTt5defX/xvs1PP/92qchCpn93XlevGPJat0hu+jeK/UcU3aZnwN+x/PJ7X/Rzf3OSOwf576VM/eG9vn7dfi/3vvVnY9/47rNbxzlX4OpVVa//HbhdAa1TJplOUc4lqdfLcm6u/g3/ZWeyfGFt/aXZ59Y2Vp9tulMBV2U6OXrow2sfTP0h/9906vwD/1/9/D+2vPtVf/200/RsgHHq53/26a17Iv/QOvIP7SX/0F7yD+0l/9Be8g/tJf/QXvIP7SX/0F7yD+11Mf8AQLtU15q+AxloStP9BwAAAAAAAAAAAAAAAAAAuGxn4mDlfBlXzY/fTE4eTNIdVr8z+D/i5PrB4+QPRX+33xT1sJE8dfuIBxjRuw3ffX3D183W/+S2ZutvrSbbrySZ73YvX3/F2fX3z934F+/3nhmxwIgeeLzZ+j/vNlt/8TD5qN9/5of1nzK3DJ6H959fqqrqjVj/xZ9GPAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABj82sAAAD//6I+cRg=") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) 12:44:20 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000400)={@map, r0, 0x24}, 0x14) 12:44:20 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000800)={0x18, 0x1411, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x3}]}, 0x18}}, 0x0) 12:44:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) [ 2794.903463][ T2081] macvtap1: entered promiscuous mode [ 2794.909049][ T2081] macvtap1: entered allmulticast mode [ 2794.922282][ T2081] dummy0: entered promiscuous mode [ 2794.924236][ T2092] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2794.927779][ T2081] dummy0: entered allmulticast mode [ 2794.945838][ T2081] team0: Device macvtap1 failed to register rx_handler 12:44:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) [ 2794.953565][ T2081] dummy0: left allmulticast mode [ 2794.959032][ T2081] dummy0: left promiscuous mode 12:44:27 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40841, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val, @void, @eth={@local, @broadcast, @val={@void}, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x3a, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8}}}}}}}, 0x3e) 12:44:27 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x9}, 0xe) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000280)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000140)={r1}, &(0x7f0000000180)=0x10) 12:44:27 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fsopen(&(0x7f0000001100)='ramfs\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fsconfig$FSCONFIG_SET_FD(r0, 0x2, &(0x7f00000011c0)='\x00', 0x7fffffffefff, r1) 12:44:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) 12:44:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x101000, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'dummy0\x00', 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000180)) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet6(0xa, 0x80003, 0x6b) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r5, &(0x7f0000000240)={0x11, 0x0, r6}, 0x14) getsockname$packet(r5, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x300}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x44}}, 0x0) 12:44:27 executing program 1: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001c80)={0x6, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r0, 0x0, 0x22}, 0x10) 12:44:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) 12:44:27 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x341883, 0x0) finit_module(r0, 0x0, 0x0) 12:44:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) 12:44:27 executing program 2: socket$unix(0x1, 0x2, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) open(&(0x7f0000000180)='./file0\x00', 0x40c5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x2, 0xbf22, 0x81}, 0x48) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket$inet6(0xa, 0x3, 0x103) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010090c90000000000000500000008000300", @ANYRES32=r6], 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff830500000000000000", @ANYRES32=r1], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) 12:44:27 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000005c0)={0x2c, r1, 0xc4fc9e906872338b, 0x0, 0x0, {{0x15}, {@val={0x8}, @void}}, [@NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0x4, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x8, 0xd, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x4, 0xe, 0x0, 0x0}]}]}]}]}, 0x2c}}, 0x0) 12:44:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$eJzs3TFoM2UYB/D/XRJr2yBVF0FQQUS0UOomuNRFoSCliAgqVERclFaoLW6tk4uDziqdXIq4WR2lS3FRBKeqHeoiaHGwOOgQSa6VaiOK6Zf7+O73g0vuknvveY/c/0mWIwEaaybJQpJWktkknSTFxR3uqZaZs82dyYOVpNd78udisF+1XTkfN51kO8nDSfbLIi+3k829Z49/PXz8/rc2Ovd9sPfM5FhP8szJ8dETp+8vvfnx4kObX37941KRhXT/cl5XrxjyWrtIbrsWxa4TRbvuGfBfLL/+0Tf93N+e5N5B/jspU314b6/ftN/Jg+/909h3fvrqznHOFbh6vV6n/x243QMap0zSTVHOJanWy3JurvoN/21rqnxlbf212ZfWNlZfrLtTAVelmxw99unEJ9N/y/8PrSr/wI2rn/+nlne/66+ftuqeDTBO/fzPPr/1QOQfGkf+obnkH5pL/qG55B+aS/6hueQfmkv+obnkH5pL/qG5LuYfAGiW3kTddyADdam7/wAAAAAAAAAAAAAAAAAAAJftTB6snC/jqvn5u8nJo0naw+q3Bv9HnNw8eJz6pejv9qeiGjaS5+4e8QAj+rDmu69v+b7e+l/cVW/9rdVk+40k8+325euvOLv+/r9b/+X9zgsjFhjRI0/XW//33XrrLx4mn/X7z/yw/lPmjsHz8P7TTTI9Yv1XfxvxAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIzNHwEAAP//YrltLw==") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) [ 2802.069233][ T2106] macvtap1: entered promiscuous mode [ 2802.074781][ T2106] macvtap1: entered allmulticast mode [ 2802.085277][ T2106] dummy0: entered promiscuous mode [ 2802.090527][ T2106] dummy0: entered allmulticast mode [ 2802.099998][ T2106] team0: Device macvtap1 failed to register rx_handler [ 2802.108694][ T2106] dummy0: left allmulticast mode [ 2802.114044][ T2106] dummy0: left promiscuous mode 12:44:28 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40841, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val, @void, @eth={@local, @broadcast, @val={@void}, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x3a, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8}}}}}}}, 0x3e) 12:44:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@func={0x7, 0x2}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f]}}, &(0x7f0000000100)=""/169, 0x2d, 0xa9, 0x1}, 0x20) 12:44:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) 12:44:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x101000, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'dummy0\x00', 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000180)) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet6(0xa, 0x80003, 0x6b) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r5, &(0x7f0000000240)={0x11, 0x0, r6}, 0x14) getsockname$packet(r5, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x300}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x44}}, 0x0) 12:44:28 executing program 0: openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f0000000040)={0x2e2d21}, 0x18) [ 2802.279429][ T2136] macvtap1: entered promiscuous mode [ 2802.284868][ T2136] macvtap1: entered allmulticast mode [ 2802.291042][ T2136] dummy0: entered promiscuous mode [ 2802.296476][ T2136] dummy0: entered allmulticast mode [ 2802.303788][ T2136] team0: Device macvtap1 failed to register rx_handler [ 2802.312350][ T2136] dummy0: left allmulticast mode [ 2802.317800][ T2136] dummy0: left promiscuous mode 12:44:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000240)='./bus\x00', 0x1009e, &(0x7f0000000900)=ANY=[@ANYRES32=0x0], 0x3, 0x42e, &(0x7f00000004c0)="$eJzs3E9vFGUcB/DvbFuIgBYV/yFoFYQq2tqiqIkh4eaB6EEPXhtaKrEUpTURQgwkHryayAvQeJWXYNTEPxc9Ga5q9KAkxEAPHIypme1uu5Ru6ULLGvbzSWZ5nplZnmfmyW9m5+kvE6Bj9ZUfRbIpyc9JeueqV+/QN/fPzKVTh8qlyOzs638X1f0uXzp1qL5r/Xsby49K0l9JKh8WeXiJdqdOnHx7ZGJi7HitPjh99J3BqRMnnzlydGR8bHxscmjv0L59Lzz/4vDQqh3rKz/N/PFZ96uTn5+9PHll//CGsr+batsaj2O19KXv6nPZYNdqN9Zm9zWUi+42doSWdCUph6unGv+96crC4PXm+1/b2jlgTc2W1jfdfHoWuI0VaXcPgPao3+jL59/6cqt+e9B+Fw/MPQBers3tzMyPf3cqc4V3d3379VXP96upL8mbB1/bXi5Zo3kYAAAAgE721YEkTy81/1fJ/Q37leUHkjyY5KEkW5NqXs+2JNuTPJLk0Xo+UQsW73/t/E/lwg0dGCty8UDyckNu10zD+Nds7qrV7iwr6SkOH5kYezbJXUn607O+rC+XpXX0rZEfm21rnP8rl7L9+lxgrR8Xuhf9fXp0ZHrkZo6ZBRfPJFu7lxr/Yj4TqEjyWJLHV/IfflfNqBvfcu6f+VUvfXTv+Wa7X3/8WUuznya7l4z/hczFYvn8zMHq9WCwflW41g9n933RrH3j315l/G9Yfvw3F435ulOtt/HNlt9+abbtRq//64o3qh1cV1v3/sj09PGhZF1x8Nr1w633+XZVPx/181WOf/+Ope//99S+U57QHUl2Jnmilru8u3rvT55M8lSSPcu0eXr893+bbRP/7VWO/2hL8d964a8zH+9s1v7K4v+5amf6a2v8/ru+lQ5Qu/sJAAAAAAAAwOqoVN+BV1QG5suVysDA3Dv8tmRDZeLY1PSew8femxyde1fe5vRU6plevQ35oEPV8kJ9eFF9b5K7k3zSdUe1PnDo2MRouw8eOtzGJvFf+rOr3b0D1pz3tULnEv/QucQ/dC7xD51L/EPnEv/QucQ/dC7xD51rcfx/cP7g/itfbjvXpu4At5D7P3Skm3mvn4KCwu1aaPeVCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOD/4b8AAAD//y2P0tw=") mkdirat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./bus\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000340)=""/218, 0xda) 12:44:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) 12:44:34 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x0, @none, 0x0, 0x2}, 0xe) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r1, &(0x7f0000000100)={0x1f, 0x0, @none, 0x0, 0x2}, 0xe) 12:44:34 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40841, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val, @void, @eth={@local, @broadcast, @val={@void}, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x3a, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8}}}}}}}, 0x3e) 12:44:34 executing program 3: syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000240)=ANY=[], 0x21, 0x4a6, &(0x7f0000000a40)="$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") mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000300)='./bus/file0\x00', 0x0) setxattr(&(0x7f0000000340)='./bus/file0\x00', &(0x7f0000000400)=@known='security.apparmor\x00', &(0x7f00000003c0)='overlay\x00', 0xe405, 0x0) 12:44:34 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x1, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x1, 0x9}], &(0x7f0000000080)='syzkaller\x00', 0x5, 0x8b, &(0x7f0000000140)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:44:34 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000001c0)={0x2, &(0x7f0000000180)=[{}, {0x20}]}) 12:44:34 executing program 0: r0 = memfd_create(&(0x7f0000000280)=';e\x00\x00\xa4\xd8\xe0\x9c\x7f9\x8aZ]3N\xbb\xe1^\x9c\xe1\x9b6s$0Y\xf8\x90\x00\x00\x00\x00\xd2~l\xf6\x12\xde\xdd\xd5\x1d\x96\xb0a\xad\xcd\x16\xd8G\xae\xd9DZm\xabO\xad\x11%\x7f`@\x16c\xc0\xb6\x1f\xe3\x00\x1a_\xc7\xbf\xa7T\xbe\x13\x8b\xb3r\xcfL\xe6\xba\xe7\x18\xb4$BIj\xa3\xc9\xc6|\x9b\x88\xddPx\x02I\xde\xe8\xcd\x02\xc1\xedc2\x06\xcbM\xfb\x13jZ\x96\xeej\x9b\xe4XjN\xb9>\xdf3U\r \x8dh8T/h)\x90\xff\x8d\xd9\x89\xab\xf8P\xacYtk\xa3\xed\xfa*8\x13\b\xce\xf8z\xed\xadnz\x96\xa3\x9a9R\xd9]\xe11We\xfe3\xe06\x1a~\x04^\xef\xa3\x0fU\x9b1\xc6J\x83\x9d[\\a\xfd\xdc\xa1\xcd\xbe\x9b\xc5z7\xe8VP\x89\x16MK`\xe5\x137\b\x00\x04\x00\x00\x00\xea\x98\xe6Z\x95j\xe3\x0ek>\x14\x80\rXS\xce\xf9\x0e\x89\xc4\xc6\x1bOm4Lla\r\xce\x17\xb5r&\xf3\x96\xbc\xc39\xa7\x95\xd9F\x17\x8bZ\xf2\xc7?&]\x8e\x98\xc3\xbd\x9e&\xb0d\xe0|u\xf5\\X\xb5\xfb+\x86P\xc6\x1c\xaf\xed\xdc\x81\x03n\x87\xef\x87\x9e_\x10\\\xe9\xdd\x12\x8ea\xe3\xcb\xc0\x16\xc4\x10\xe5\xb6\x15\x00\xfc\x1f\x9bi\xe2\xcb\xf3\xe9\x9b\xb9J4\x03\xd0\xfb\xc1\a8S\xc1Q\xdb\xcer\xd3\x0f,\xdf\x8c\xa3>\xb1\x87\xad/q\x12\x84\x03cn\'\n:\x14\"\xd4\xfbT\xcf\xa0\xa9!\xef\f!spq`\"\xbf\xec>\x8a\x1cI&', 0x0) write(r0, &(0x7f00000000c0)='{', 0xfffffe1e) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) lseek(r0, 0x0, 0x4) 12:44:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) 12:44:34 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_read_part_table(0x5d6, &(0x7f0000000600)="$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") 12:44:34 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40841, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val, @void, @eth={@local, @broadcast, @val={@void}, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x3a, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8}}}}}}}, 0x3e) 12:44:34 executing program 3: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000300)='./bus/file0\x00', 0x0) setxattr(&(0x7f0000000340)='./bus/file0\x00', &(0x7f0000000400)=@known='security.apparmor\x00', &(0x7f00000003c0)='overlay\x00', 0xe407, 0x0) rmdir(&(0x7f0000000240)='./bus/file0\x00') 12:44:41 executing program 1: syz_io_uring_setup(0x1ded, &(0x7f0000000180), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x9) 12:44:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) 12:44:41 executing program 4: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/keycreate\x00', 0x2, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) fchown(r0, 0x0, 0xee01) 12:44:41 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000080)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000140), r1, 0x0, 0x3, 0x1}}, 0x20) 12:44:41 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) listen(r0, 0x0) r1 = syz_io_uring_setup(0x15b6, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000d8c000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000240)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r1, 0x90e, 0x0, 0x0, 0x0, 0x0) shutdown(r0, 0x0) 12:44:41 executing program 2: mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1000, 0x0) r0 = open$dir(&(0x7f00000000c0)='./file1\x00', 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x1) openat$incfs(r0, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000000)='./file1\x00', 0x801, 0x0) 12:44:41 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x4, &(0x7f00000001c0)=[{0x2}, {0x3d, 0x0, 0x1}, {}, {0x6}]}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@deltclass={0x24, 0x29, 0x8f34cae9cd74727}, 0x24}}, 0x0) 12:44:41 executing program 0: r0 = socket(0x15, 0x5, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) 12:44:41 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x5c) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) writev(r5, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) writev(r5, &(0x7f00000000c0)=[{&(0x7f0000000040)="390000001000111868090707a640000f0021ff3f04000000170a001700000000040037001000030001632564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) sched_setaffinity(0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) socket$vsock_stream(0x28, 0x1, 0x0) socket$igmp(0x2, 0x3, 0x2) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000380)={0x2, 0x4e22, @broadcast}, 0x10) 12:44:41 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x7, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x1b}]}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:44:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) 12:44:41 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) getpid() write$cgroup_pressure(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000340)) write$cgroup_int(r3, &(0x7f0000000200), 0x43451) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000380)='#!+:%\'\\,{\x8e%$[\x00') ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000004c0)={r1}, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={@cgroup=r4, r2, 0x7}, 0x10) r5 = gettid() perf_event_open(&(0x7f0000000600)={0x0, 0x80, 0x81, 0x2, 0x0, 0x40, 0x0, 0x352e, 0x20, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x1, 0x3, 0x0, 0x7f, 0x9, 0x0, 0x0, 0x0, 0x80000001}, r5, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x80, 0x2, 0x81, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfc, 0x1, @perf_bp={&(0x7f0000000300)}, 0x227, 0x7, 0x3ff, 0x0, 0x7, 0x0, 0xff, 0x0, 0x3, 0x0, 0x10000}, 0x0, 0x2, 0xffffffffffffffff, 0x11) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x20, 0x0, 0x6, 0x0, 0x3, 0x6000, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44, 0x2, @perf_config_ext={0x3, 0x8}, 0x2580, 0x7, 0x4, 0x1, 0x1ff, 0x0, 0x7, 0x0, 0x9, 0x0, 0x40}, r5, 0x4, 0xffffffffffffffff, 0x8) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.numa_stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000440)={0x4, 0x80, 0x35, 0xff, 0x80, 0x1f, 0x0, 0x5, 0xa, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000002c0), 0xf}, 0x2, 0x7, 0x1000, 0x3, 0xfffffffffffffff8, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x7ff}) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r8, &(0x7f0000000040), 0x2, 0x0) openat$cgroup_ro(r7, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x400c6615, 0x0) [ 2815.468854][ T25] audit: type=1400 audit(1682858681.288:1155): avc: denied { setattr } for pid=2171 comm="syz-executor.4" name="keycreate" dev="proc" ino=99399 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=file permissive=1 [ 2815.636264][ T2197] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2815.646721][ T2197] gretap0: entered promiscuous mode [ 2815.671284][ T2197] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2815.680755][ T2197] 0ªX¹¦Dö»: renamed from gretap0 [ 2815.690221][ T2197] 0ªX¹¦Dö»: left promiscuous mode [ 2815.695371][ T2197] 0ªX¹¦Dö»: entered allmulticast mode [ 2815.702881][ T2197] A link change request failed with some changes committed already. Interface c0ªX¹¦Dö» may have been left with an inconsistent configuration, please check. [ 2816.368341][ T25] audit: type=1400 audit(1682858682.188:1156): avc: denied { unmount } for pid=21509 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 12:44:47 executing program 1: syz_io_uring_setup(0x1ded, &(0x7f0000000180), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x9) 12:44:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000080)=@gcm_128={{0x303, 0x38}, "837ad552a4a62b08", "e420000021000000000800", "ff05030c", "22018000e60100"}, 0x28) setsockopt$inet6_tcp_int(r0, 0x6, 0x20, &(0x7f0000000100), 0x47) 12:44:47 executing program 0: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x40010, r0, 0x0) 12:44:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) 12:44:47 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) getpid() write$cgroup_pressure(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000340)) write$cgroup_int(r3, &(0x7f0000000200), 0x43451) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000380)='#!+:%\'\\,{\x8e%$[\x00') ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000004c0)={r1}, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={@cgroup=r4, r2, 0x7}, 0x10) r5 = gettid() perf_event_open(&(0x7f0000000600)={0x0, 0x80, 0x81, 0x2, 0x0, 0x40, 0x0, 0x352e, 0x20, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x1, 0x3, 0x0, 0x7f, 0x9, 0x0, 0x0, 0x0, 0x80000001}, r5, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x80, 0x2, 0x81, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfc, 0x1, @perf_bp={&(0x7f0000000300)}, 0x227, 0x7, 0x3ff, 0x0, 0x7, 0x0, 0xff, 0x0, 0x3, 0x0, 0x10000}, 0x0, 0x2, 0xffffffffffffffff, 0x11) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x20, 0x0, 0x6, 0x0, 0x3, 0x6000, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44, 0x2, @perf_config_ext={0x3, 0x8}, 0x2580, 0x7, 0x4, 0x1, 0x1ff, 0x0, 0x7, 0x0, 0x9, 0x0, 0x40}, r5, 0x4, 0xffffffffffffffff, 0x8) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.numa_stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000440)={0x4, 0x80, 0x35, 0xff, 0x80, 0x1f, 0x0, 0x5, 0xa, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000002c0), 0xf}, 0x2, 0x7, 0x1000, 0x3, 0xfffffffffffffff8, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x7ff}) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r8, &(0x7f0000000040), 0x2, 0x0) openat$cgroup_ro(r7, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x400c6615, 0x0) 12:44:47 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x5c) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) writev(r5, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) writev(r5, &(0x7f00000000c0)=[{&(0x7f0000000040)="390000001000111868090707a640000f0021ff3f04000000170a001700000000040037001000030001632564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) sched_setaffinity(0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) socket$vsock_stream(0x28, 0x1, 0x0) socket$igmp(0x2, 0x3, 0x2) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000380)={0x2, 0x4e22, @broadcast}, 0x10) 12:44:47 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) getpid() write$cgroup_pressure(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000340)) write$cgroup_int(r3, &(0x7f0000000200), 0x43451) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000380)='#!+:%\'\\,{\x8e%$[\x00') ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000004c0)={r1}, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={@cgroup=r4, r2, 0x7}, 0x10) r5 = gettid() perf_event_open(&(0x7f0000000600)={0x0, 0x80, 0x81, 0x2, 0x0, 0x40, 0x0, 0x352e, 0x20, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x1, 0x3, 0x0, 0x7f, 0x9, 0x0, 0x0, 0x0, 0x80000001}, r5, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x80, 0x2, 0x81, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfc, 0x1, @perf_bp={&(0x7f0000000300)}, 0x227, 0x7, 0x3ff, 0x0, 0x7, 0x0, 0xff, 0x0, 0x3, 0x0, 0x10000}, 0x0, 0x2, 0xffffffffffffffff, 0x11) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x20, 0x0, 0x6, 0x0, 0x3, 0x6000, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44, 0x2, @perf_config_ext={0x3, 0x8}, 0x2580, 0x7, 0x4, 0x1, 0x1ff, 0x0, 0x7, 0x0, 0x9, 0x0, 0x40}, r5, 0x4, 0xffffffffffffffff, 0x8) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.numa_stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000440)={0x4, 0x80, 0x35, 0xff, 0x80, 0x1f, 0x0, 0x5, 0xa, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000002c0), 0xf}, 0x2, 0x7, 0x1000, 0x3, 0xfffffffffffffff8, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x7ff}) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r8, &(0x7f0000000040), 0x2, 0x0) openat$cgroup_ro(r7, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x400c6615, 0x0) 12:44:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) 12:44:47 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000080)) 12:44:47 executing program 2: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmsg$NL80211_CMD_SET_COALESCE(r0, &(0x7f0000001200)={&(0x7f0000001080), 0xc, &(0x7f00000011c0)={&(0x7f00000010c0)={0x80, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_ATTR_COALESCE_RULE_CONDITION={0x8}, @NL80211_ATTR_COALESCE_RULE_PKT_PATTERN={0x58, 0x3, 0x0, 0x1, [{0x54, 0x0, 0x0, 0x1, @NL80211_PKTPAT_MASK={0x4d, 0x1, "af2a3058af004926f2e564793f9f6e84ffc6024ca2dc60ee4b48bbbd1e1e55e57100010bcb270a16e4094168bf798ab3f7fe8874564e80579ea12e5ef373f8cf0784a6ffacca09a5e4"}}]}]}, 0x80}}, 0x0) 12:44:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) 12:44:47 executing program 2: syz_open_dev$evdev(&(0x7f0000000100), 0x8000000000000001, 0x80300) [ 2821.953061][ T2229] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2822.004084][ T2229] 0ªX¹¦Dö»: entered promiscuous mode [ 2822.009550][ T2229] 0ªX¹¦Dö»: left allmulticast mode [ 2822.246876][ T2230] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2822.256291][ T2230] 1ªX¹¦Dö»: renamed from c0ªX¹¦Dö» [ 2822.263054][ T2230] 1ªX¹¦Dö»: left promiscuous mode [ 2822.268239][ T2230] 1ªX¹¦Dö»: entered allmulticast mode [ 2822.275019][ T2230] A link change request failed with some changes committed already. Interface c1ªX¹¦Dö» may have been left with an inconsistent configuration, please check. 12:44:54 executing program 1: syz_io_uring_setup(0x1ded, &(0x7f0000000180), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x9) 12:44:54 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) getpid() write$cgroup_pressure(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000340)) write$cgroup_int(r3, &(0x7f0000000200), 0x43451) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000380)='#!+:%\'\\,{\x8e%$[\x00') ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000004c0)={r1}, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={@cgroup=r4, r2, 0x7}, 0x10) r5 = gettid() perf_event_open(&(0x7f0000000600)={0x0, 0x80, 0x81, 0x2, 0x0, 0x40, 0x0, 0x352e, 0x20, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x1, 0x3, 0x0, 0x7f, 0x9, 0x0, 0x0, 0x0, 0x80000001}, r5, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x80, 0x2, 0x81, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfc, 0x1, @perf_bp={&(0x7f0000000300)}, 0x227, 0x7, 0x3ff, 0x0, 0x7, 0x0, 0xff, 0x0, 0x3, 0x0, 0x10000}, 0x0, 0x2, 0xffffffffffffffff, 0x11) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x20, 0x0, 0x6, 0x0, 0x3, 0x6000, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44, 0x2, @perf_config_ext={0x3, 0x8}, 0x2580, 0x7, 0x4, 0x1, 0x1ff, 0x0, 0x7, 0x0, 0x9, 0x0, 0x40}, r5, 0x4, 0xffffffffffffffff, 0x8) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.numa_stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000440)={0x4, 0x80, 0x35, 0xff, 0x80, 0x1f, 0x0, 0x5, 0xa, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000002c0), 0xf}, 0x2, 0x7, 0x1000, 0x3, 0xfffffffffffffff8, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x7ff}) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r8, &(0x7f0000000040), 0x2, 0x0) openat$cgroup_ro(r7, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x400c6615, 0x0) 12:44:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) 12:44:54 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x9, &(0x7f0000000040)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x8f}, @generic={0x26}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:44:54 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) getpid() write$cgroup_pressure(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000340)) write$cgroup_int(r3, &(0x7f0000000200), 0x43451) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000380)='#!+:%\'\\,{\x8e%$[\x00') ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000004c0)={r1}, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={@cgroup=r4, r2, 0x7}, 0x10) r5 = gettid() perf_event_open(&(0x7f0000000600)={0x0, 0x80, 0x81, 0x2, 0x0, 0x40, 0x0, 0x352e, 0x20, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x1, 0x3, 0x0, 0x7f, 0x9, 0x0, 0x0, 0x0, 0x80000001}, r5, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x80, 0x2, 0x81, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfc, 0x1, @perf_bp={&(0x7f0000000300)}, 0x227, 0x7, 0x3ff, 0x0, 0x7, 0x0, 0xff, 0x0, 0x3, 0x0, 0x10000}, 0x0, 0x2, 0xffffffffffffffff, 0x11) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x20, 0x0, 0x6, 0x0, 0x3, 0x6000, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44, 0x2, @perf_config_ext={0x3, 0x8}, 0x2580, 0x7, 0x4, 0x1, 0x1ff, 0x0, 0x7, 0x0, 0x9, 0x0, 0x40}, r5, 0x4, 0xffffffffffffffff, 0x8) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.numa_stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000440)={0x4, 0x80, 0x35, 0xff, 0x80, 0x1f, 0x0, 0x5, 0xa, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000002c0), 0xf}, 0x2, 0x7, 0x1000, 0x3, 0xfffffffffffffff8, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x7ff}) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r8, &(0x7f0000000040), 0x2, 0x0) openat$cgroup_ro(r7, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x400c6615, 0x0) 12:44:54 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x5c) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) writev(r5, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) writev(r5, &(0x7f00000000c0)=[{&(0x7f0000000040)="390000001000111868090707a640000f0021ff3f04000000170a001700000000040037001000030001632564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) sched_setaffinity(0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) socket$vsock_stream(0x28, 0x1, 0x0) socket$igmp(0x2, 0x3, 0x2) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000380)={0x2, 0x4e22, @broadcast}, 0x10) 12:44:54 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000e00800000000000000000000850000006d00000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002300000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000000)=r2, 0x4) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x14, 0x2, 0x6, 0x3}, 0x14}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kfree\x00', r0}, 0x10) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/block/loop0', 0x0, 0x0) getdents64(r3, &(0x7f00000001c0)=""/112, 0x18) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), 0xffffffffffffffff) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x34, 0x10, 0x1, 0x0, 0xfffffffd, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x3, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}]}, 0x34}], 0x1}, 0x0) r6 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000580)={'veth1_virt_wifi\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r6, 0x1, 0x41, &(0x7f0000000140)=0x48a, 0x4) bind$packet(r6, &(0x7f0000000080)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$packet(r6, &(0x7f0000000040)="bb53a945842851722bb479853e60", 0xe, 0x0, 0x0, 0x0) recvmsg(r6, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x2022) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r6, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001680)={&(0x7f00000017c0)=ANY=[@ANYBLOB="1c0000e4", @ANYRES16=0x0, @ANYBLOB="ff0000000000000000000000e5121b040000bad332b4495daf56c284c04798efdde9c10cce", @ANYRESOCT=r4, @ANYBLOB="6aacfd6bb38b34f65305384f12c4a7df8b5f65684e4049f91d50159860252d33fc04299a7a24d9553d75b47695ce501020fc15013a2b5da7969ab5d02651550bf1ec5e1fabded839ee360af6a387c4f4dc91a9c375757cf76d8f40ca9794831b7154a11b1f2d3a55571b2d30f5accc876befd31c61bbd3a65063e915d9565a95cf871a4ea58eb9192669a6261bb3e77d6d5e54adf6b9842a67d3586e75f75a5a0c0419349514ea6934b17e4ae35a203c60f75f2a393d51bcda6a7b61103694f8f17fbad9353c7e9e1f83d5ef862f12bbf7a24fe587c345ef772c0f7d66e2dba3ca0956eae2224534b05ede20077c40375969c4590cbe2dcaaf"], 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000680)={0xbc, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r8}, @val={0xc, 0x99, {0xfd, 0x203e}}}}, [@NL80211_ATTR_KEY={0x34, 0x50, 0x0, 0x1, [@NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}, @NL80211_KEY_MODE={0x5, 0x9, 0x1}, @NL80211_KEY_IDX={0x5, 0x2, 0x1}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "aa6a63989205ded5b573273871"}, @NL80211_KEY_DEFAULT={0x4}]}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x2}, @NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x5}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x20, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "a472ae6af2"}, @NL80211_ATTR_KEY_SEQ={0x14, 0xa, "3615d9f9a4ea930c374b9addd9e22040"}]}, 0xbc}, 0x1, 0x0, 0x0, 0x800}, 0x6008000) sendmsg$NL80211_CMD_REGISTER_BEACONS(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, 0x0, 0x200, 0x70bd2c, 0x25dfdbfc, {{}, {@val={0x8, 0x1, 0x4c}, @val={0x8, 0x3, r8}, @void}}, ["", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x20000004) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, r4, 0x8, 0x70bd2d, 0x25dfdbff, {{}, {@val={0x8, 0x3, r8}, @val={0xc, 0x99, {0x1000, 0x66}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x4c}, 0x1, 0x0, 0x0, 0xed5b61eb9060c1a2}, 0x8800) sendmsg$NL80211_CMD_NOTIFY_RADAR(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000005c0)={&(0x7f00000008c0)=ANY=[@ANYBLOB="8fe7f0e535450836a528000000", @ANYRES16=r4, @ANYBLOB="200027bd7000fcdbdf25860000000c00990004000000010000000800a00004000000"], 0x28}}, 0x40000) sendmsg$NL80211_CMD_SET_POWER_SAVE(r3, &(0x7f0000001540)={&(0x7f0000001440), 0xc, &(0x7f0000001500)={&(0x7f0000001480)={0x58, r4, 0x100, 0x70bd2a, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x8001, 0x2d}}}}, [@NL80211_ATTR_PS_STATE={0x8, 0x5d, 0x1}, @NL80211_ATTR_PS_STATE={0x8, 0x5d, 0x1}, @NL80211_ATTR_PS_STATE={0x8, 0x5d, 0x1}, @NL80211_ATTR_PS_STATE={0x8}, @NL80211_ATTR_PS_STATE={0x8}, @NL80211_ATTR_PS_STATE={0x8}, @NL80211_ATTR_PS_STATE={0x8}]}, 0x58}, 0x1, 0x0, 0x0, 0x24008000}, 0x810) unshare(0x2000400) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r10 = openat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x402000, 0x0, 0x10}, 0x18) writev(r10, &(0x7f0000001400)=[{&(0x7f00000000c0)="0a8ba3832cd2fe8217433f96d49401f8c87d480571bff3404226832fedef5d843313deb894ec4e8e3f12c875e0a9887982e4ed377760a21c9625950fdd9aac676e51ea18b93bc127", 0x48}, {&(0x7f0000000240)="d4770d09745d53db2691b7f06a39a6e5fdb9c8c24e68cea8385e75ace2063ca93815fbb8ab19cba95269aca8ddccc2003e0da944eb14c3bdae451fb19766973c3e485947c64b6e330b675d2e5004dbeb34760cb262ce1a1ecca021466e277dbff8e0dae99e4f6088b9887653d24c8f1e46959eb330ca4950f6a3b99f21b8a72c93fab29201436dc7cfac4ab6ed9fe4082d1b78dfec78873b49d29fa5a97a1ae1e5d9880fe427ac5b4136802c6926d25afa7a81e6e32ce4fdc2a1a64f6b74d6f82ddf89ce0c5b2c354db99048da9abe2b5353d923cedc", 0xd6}, {&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000001340)="41947765e249affff4c80fdf324ac68e3d15609c94f030649e4e1407ab47f749dc995a7d0d5de69b8840c268f48d4d66001b4d861fe76657f1b96ca1208d39f007961c3b1517933c9e52839c3bbf7047fa39c23f21ca66f23702a93d7335c7b347d11084f59ce2fc288bcffab62ec963772ebd9d9fd51f31646bf9f567f6f506211de9ae137453af67b3c03e2d5e", 0x8e}], 0x4) preadv(r9, 0x0, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_GET_MPP(r5, &(0x7f0000001640)={&(0x7f0000001580)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001600)={&(0x7f00000015c0)={0x40, r4, 0x400, 0x70bd25, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r8}, @val={0xc, 0x99, {0xfff, 0x56}}}}}, 0x4c}, 0x1, 0x0, 0x0, 0x40}, 0x24000000) 12:44:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) 12:44:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f0000000000)={[{@nojournal_checksum}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}, {@auto_da_alloc}, {@quota}, {@minixdf}, {@prjquota}, {@nogrpid}, {@dioread_nolock}, {@lazytime}]}, 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)=ANY=[@ANYBLOB="02000000000000f2ff00000000ff000000000000000000000000004000000000000000000000008825fd9800", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f3031323334d7d93738393a3b3c3d3e3f40"]) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) 12:44:54 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) getpid() write$cgroup_pressure(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000340)) write$cgroup_int(r3, &(0x7f0000000200), 0x43451) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000380)='#!+:%\'\\,{\x8e%$[\x00') ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000004c0)={r1}, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={@cgroup=r4, r2, 0x7}, 0x10) r5 = gettid() perf_event_open(&(0x7f0000000600)={0x0, 0x80, 0x81, 0x2, 0x0, 0x40, 0x0, 0x352e, 0x20, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x1, 0x3, 0x0, 0x7f, 0x9, 0x0, 0x0, 0x0, 0x80000001}, r5, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x80, 0x2, 0x81, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfc, 0x1, @perf_bp={&(0x7f0000000300)}, 0x227, 0x7, 0x3ff, 0x0, 0x7, 0x0, 0xff, 0x0, 0x3, 0x0, 0x10000}, 0x0, 0x2, 0xffffffffffffffff, 0x11) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x20, 0x0, 0x6, 0x0, 0x3, 0x6000, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44, 0x2, @perf_config_ext={0x3, 0x8}, 0x2580, 0x7, 0x4, 0x1, 0x1ff, 0x0, 0x7, 0x0, 0x9, 0x0, 0x40}, r5, 0x4, 0xffffffffffffffff, 0x8) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.numa_stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000440)={0x4, 0x80, 0x35, 0xff, 0x80, 0x1f, 0x0, 0x5, 0xa, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000002c0), 0xf}, 0x2, 0x7, 0x1000, 0x3, 0xfffffffffffffff8, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x7ff}) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r8, &(0x7f0000000040), 0x2, 0x0) openat$cgroup_ro(r7, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x400c6615, 0x0) [ 2828.280640][ T2251] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 2828.289285][ T2251] vxlan0: left allmulticast mode [ 2828.295388][ T2251] bond7: left promiscuous mode [ 2828.300259][ T2251] bond7: left allmulticast mode [ 2828.361921][ T2260] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2828.372294][ T2260] 1ªX¹¦Dö»: entered promiscuous mode [ 2828.377710][ T2260] 1ªX¹¦Dö»: left allmulticast mode [ 2828.400477][ T2260] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. 12:44:54 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) getpid() write$cgroup_pressure(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000340)) write$cgroup_int(r3, &(0x7f0000000200), 0x43451) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000380)='#!+:%\'\\,{\x8e%$[\x00') ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000004c0)={r1}, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={@cgroup=r4, r2, 0x7}, 0x10) r5 = gettid() perf_event_open(&(0x7f0000000600)={0x0, 0x80, 0x81, 0x2, 0x0, 0x40, 0x0, 0x352e, 0x20, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x1, 0x3, 0x0, 0x7f, 0x9, 0x0, 0x0, 0x0, 0x80000001}, r5, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x80, 0x2, 0x81, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfc, 0x1, @perf_bp={&(0x7f0000000300)}, 0x227, 0x7, 0x3ff, 0x0, 0x7, 0x0, 0xff, 0x0, 0x3, 0x0, 0x10000}, 0x0, 0x2, 0xffffffffffffffff, 0x11) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x20, 0x0, 0x6, 0x0, 0x3, 0x6000, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44, 0x2, @perf_config_ext={0x3, 0x8}, 0x2580, 0x7, 0x4, 0x1, 0x1ff, 0x0, 0x7, 0x0, 0x9, 0x0, 0x40}, r5, 0x4, 0xffffffffffffffff, 0x8) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.numa_stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000440)={0x4, 0x80, 0x35, 0xff, 0x80, 0x1f, 0x0, 0x5, 0xa, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000002c0), 0xf}, 0x2, 0x7, 0x1000, 0x3, 0xfffffffffffffff8, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x7ff}) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r8, &(0x7f0000000040), 0x2, 0x0) openat$cgroup_ro(r7, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x400c6615, 0x0) [ 2828.409937][ T2260] 0ªX¹¦Dö»: renamed from c1ªX¹¦Dö» [ 2828.417192][ T2260] 0ªX¹¦Dö»: left promiscuous mode [ 2828.422324][ T2260] 0ªX¹¦Dö»: entered allmulticast mode [ 2828.429376][ T2260] A link change request failed with some changes committed already. Interface c0ªX¹¦Dö» may have been left with an inconsistent configuration, please check. 12:44:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f0000000000)={[{@nojournal_checksum}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}, {@auto_da_alloc}, {@quota}, {@minixdf}, {@prjquota}, {@nogrpid}, {@dioread_nolock}, {@lazytime}]}, 0x0, 0x236, &(0x7f0000000300)="$eJzs3TFoM2UcBvDnLomf/b4gVRdBUEFEtFDqJrjURaEgpYgIKlREXJRWqC1urZOLg84qnVyKuFkdpUtxUQSnqh3qImhxsDjoELlcK9VGFFNz8t3vB5fcJe97//e4e95kOS5Aa00nmU/SSTKTpJekON/grnqZPt3cntpfTgaDx38shu3q7dpZv2tJtpI8mGSvLPJiN9nYffro54NH731jvXfPe7tPTU30IE8dHx0+dvLu4usfLjyw8fmX3y8WmU//D8d1+YoRn3WL5Jb/otj/RNFtegT8E0uvfvBVlftbk9w9zH8vZeqT9+baDXu93P/OX/V964cvbp/kWIHLNxj0qt/ArQHQOmWSfopyNkm9Xpazs/V/+K87V8uXVtdemXlhdX3l+aZnKuCy9JPDRz6+8tG1P+X/u06df+D6VeX/iaWdb6r1k07TowEmqcr/zLOb90X+oXXkH9pL/qG95B/aS/6hveQf2kv+ob3kH9pL/qG95B/a63z+AYB2GVxp+g5koClNzz8AAAAAAAAAAAAAAAAAAMBF21P7y2fLpGp++nZy/HCS7qj6neHziJMbh69XfyqqZr8r6m5jeebOMXcwpvcbvvv6pm+brf/ZHc3W31xJtl5LMtftXrz+itPr79+7+W++7z03ZoExPfRks/V/3Wm2/sJB8kk1/8yNmn/K3DZ8Hz3/9KvzN2b9l38ZcwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABMzG8BAAD//8n0bSk=") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)=ANY=[@ANYBLOB="02000000000000f2ff00000000ff000000000000000000000000004000000000000000000000008825fd9800", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f3031323334d7d93738393a3b3c3d3e3f40"]) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f0000000000)={[{@nojournal_checksum}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}, {@auto_da_alloc}, {@quota}, {@minixdf}, {@prjquota}, {@nogrpid}, {@dioread_nolock}, {@lazytime}]}, 0x0, 0x236, &(0x7f0000000300)="$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") (async) openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) (async) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)=ANY=[@ANYBLOB="02000000000000f2ff00000000ff000000000000000000000000004000000000000000000000008825fd9800", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f3031323334d7d93738393a3b3c3d3e3f40"]) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) (async) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) (async) write(r2, &(0x7f0000000740)='foo', 0x3) (async) 12:45:01 executing program 1: syz_io_uring_setup(0x1ded, &(0x7f0000000180), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x9) 12:45:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f0000000000)={[{@nojournal_checksum}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}, {@auto_da_alloc}, {@quota}, {@minixdf}, {@prjquota}, {@nogrpid}, {@dioread_nolock}, {@lazytime}]}, 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)=ANY=[@ANYBLOB="02000000000000f2ff00000000ff000000000000000000000000004000000000000000000000008825fd9800", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f3031323334d7d93738393a3b3c3d3e3f40"]) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) 12:45:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r0, &(0x7f0000002400)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000000)="c6", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)='}', 0x1}], 0x1, &(0x7f00000006c0)=[{0x10}, {0x10, 0x1, 0x2}], 0x20}}], 0x2, 0x0) 12:45:01 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sys_exit\x00', r0}, 0x10) delete_module(&(0x7f0000000080)='\x00', 0x0) 12:45:01 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000001400)='}', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) shutdown(r0, 0x1) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f00000000c0), 0x4) 12:45:01 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x5c) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) writev(r5, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) writev(r5, &(0x7f00000000c0)=[{&(0x7f0000000040)="390000001000111868090707a640000f0021ff3f04000000170a001700000000040037001000030001632564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) sched_setaffinity(0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) socket$vsock_stream(0x28, 0x1, 0x0) socket$igmp(0x2, 0x3, 0x2) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000380)={0x2, 0x4e22, @broadcast}, 0x10) 12:45:01 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000040)={0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)="0de47370563ed450e74fba9ee15cc0c3e9adc85caf8b84722462ad1524c66bfb8e45ba6e3874c65b829b1f1a235b810048fb0515cee67cdaf9aeae595c1e8ea1a61d9424981d3f26e4699a206bcdd0f8f537456688f3cdfc7045da32842f9b8e41127ed99b2cfa30c0521f50ac45b1376968c3cefebb90e34594fd8c1c767c68845044d33ecc85388e44fadd6ff04e3ff646ef3ea48156ec220831e204181e64ba8ed660fb3849b97cf8d3bc64c1716552988b6abeb681890c0e7ca00704a1c464243e283055b0d94878faa0e157bedeec96696e32d5ea55c2b8d71d9c5ea97ed48e5b690f2eb58022724c6b8d782b6714a1359fbd344b7cdededf7ad37ddaf7510a0e4b91b28f9d6f07289271392d002d3e1a3bb3c833a1e8ffd0053f6814b3ff52e60400000000000000cbd5a976f17a600ba541c4148e9d4eb27f8e5da41bee540b020599254f3e274d8834fecc7f0ac2fa8c05000000af2c765257444a0600000000000000937240ae45d78b49edadf0bab15d48a0c013ff9244c3196fe8f6383892dfe6f91a41c774602247aae66c1029cd3ed37cd8eb12a624b04ff6937ca7dd1f2cd99a8ec0f03d416f401397ca9c82e24ffa9d9462f00500bcc7f068a938ba402d655e962cc7a99695dcc9b2a88d46ddb96c2ab95cdb41fb79e4181f08796ad3404bd1ee43bcdd48baeb38af36fb70201c7b7219e64f2d92037c9a0f420a9f7253f35e8b2d2c528b766935ed697e0027bf6ee60d60d157ab1a4153f9555b22f2ab3b6140fa15bb8f059efe6eb9371d47946a99db681923e9b1511387e2b877cf127d98c0956522d91c4d861eeb3bbb4f45d2ae367ba7f7d4a904a6439426fb02aab584a05a1ee734afa4c15f38b5b67217863cd7f940f21d767f7798df5526037f175968acddfa42b377b76506d4262fae4d68e1ab84f279f1b09060c0ec58480205eba61ef9592545367a978d1e193ce8e5ff8fe681a320bc8400c1ced79a87fa3623559c3bae1e96b88eb6f218b58396a053755b9c60f4605f3473ef8003b1b28cbd43a4aba87e4ead0c84c41af5050000008aef3e1653035667a1d93772604f4c9b6b592c0e83106a63009e5c9c54eb560826be1f00000000000000626589d872ceadaeac878e2ae566bc2a6c6739dc0cf08879563b96fee0035c22d3736a07b3b0eda0e827d75b06fa7ac43927ef8383e7ccad0664f6632e174b99474055e58673c653042497159a91142f4728789510bd2e944d51074b58342ce8bc3d3fd4dc4be04a3f1ccdc792f142703cfe1c2b104c7d62dec4ba9e0cb9cb1ca9ae9a58b789fa9307761551747ac4e6890107f8941ca6486cb443abb0c7000000000000000000000000000000000000000000000500"}) 12:45:01 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40841, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000040)={@void, @void, @eth={@broadcast, @broadcast, @val={@void}, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x32, 0x0, @empty, @multicast1}, "9925537b2cf5957f"}}}}}, 0x2e) 12:45:01 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x20}) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000012, 0x28011, r0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r2, 0x7}) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x58}, [@ldst={0x6, 0x0, 0x2}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3e0, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x76}, 0x48) [ 2835.417212][ T2307] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2835.427763][ T2307] 0ªX¹¦Dö»: entered promiscuous mode [ 2835.433201][ T2307] 0ªX¹¦Dö»: left allmulticast mode 12:45:01 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000001400)='}', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) shutdown(r0, 0x1) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f00000000c0), 0x4) 12:45:01 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x5) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=ANY=[@ANYBLOB="3c0000002800666f82270d000000f7ffffffffffffff00", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000b000100666c6f7765720000040002000600050000090000"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000440)={&(0x7f0000000900)=ANY=[@ANYBLOB="800100006d00200026bd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x180}, 0x1, 0x0, 0x0, 0x40081}, 0x4000800) connect$can_bcm(r2, &(0x7f0000000000), 0x10) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000880), 0x222800) ioctl$FIBMAP(r3, 0x1, &(0x7f00000008c0)=0x1f) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3b0a08bd17"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$can_bcm(r2, &(0x7f00000003c0)={&(0x7f0000000280)={0x1d, r1}, 0x10, &(0x7f0000000300)={&(0x7f0000001a40)=ANY=[@ANYBLOB="02000000200000000100000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="000000a0010000000200008000000448156a396d2009612106d10378dc6cc0f15b7a6651f6dac41d04d85fdacb265114addf13a7a7710db2bb4a2fffffffff3ac90bdcc30d7091b072b259db8f2ba447edbfcc88f1c2ea31d10f4f7468d8b4071f4645c2c5c32e2b17e75daf539a3ae838d93000da567783f866619ff6370b842fd6e04aa0582ecf5e3e7812e771f8610100000001000000a495a97db7fec8b0"], 0x80}, 0x1, 0x0, 0x0, 0x4004000}, 0x40) r4 = creat(&(0x7f0000000200)='./bus\x00', 0x200) r5 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x39}}}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001b40)={{r6, 0x2, 0x0, 0x0, 0x7fd, 0xfffffffffffffffa, 0x2, 0x5, 0x80000000, 0x0, 0x96e, 0x2, 0x3, 0x8, 0x6}}) ftruncate(r4, 0x800) lseek(r4, 0x200, 0x0) r7 = socket(0x2, 0x2, 0x1) r8 = socket(0x10, 0x803, 0x0) getsockname$packet(r8, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=ANY=[@ANYBLOB="4000000010003904000000008000000000000000", @ANYRES32=0x0, @ANYBLOB="01980000000000002000128008000100677265001400028008000100", @ANYRES32=r9, @ANYBLOB="08000700ac1e0001"], 0x40}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r10, 0x81f8943c, &(0x7f00000017c0)) sendto$packet(0xffffffffffffffff, &(0x7f0000000b00)='*\x00\x00\x00\x00\x00\x00\x00', 0x8, 0x0, &(0x7f0000000000)={0x3, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ccfb7708ffca"}, 0x2) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r7, 0x80047210, &(0x7f0000000400)) r11 = open(&(0x7f0000000000)='./bus\x00', 0x66140, 0x0) sendfile(r4, r11, 0x0, 0xee00) [ 2835.457867][ T2307] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2835.467224][ T2307] 1ªX¹¦Dö»: renamed from c0ªX¹¦Dö» [ 2835.476716][ T2307] 1ªX¹¦Dö»: left promiscuous mode [ 2835.481900][ T2307] 1ªX¹¦Dö»: entered allmulticast mode [ 2835.489022][ T2307] A link change request failed with some changes committed already. Interface c1ªX¹¦Dö» may have been left with an inconsistent configuration, please check. 12:45:01 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$eJzs3TFoM2UcBvDnLomf/b4gVRdBUEFEtFDqJrjURaEgpYgIKlREXJRWqC1urZOLg84qnVyKuFkdpUtxUQSnqh3qImhxsDjoELlcK9VGFFNz8t3vB5fcJe97//e4e95kOS5Aa00nmU/SSTKTpJekON/grnqZPt3cntpfTgaDx38shu3q7dpZv2tJtpI8mGSvLPJiN9nYffro54NH731jvXfPe7tPTU30IE8dHx0+dvLu4usfLjyw8fmX3y8WmU//D8d1+YoRn3WL5Jb/otj/RNFtegT8E0uvfvBVlftbk9w9zH8vZeqT9+baDXu93P/OX/V964cvbp/kWIHLNxj0qt/ArQHQOmWSfopyNkm9Xpazs/V/+K87V8uXVtdemXlhdX3l+aZnKuCy9JPDRz6+8tG1P+X/u06df+D6VeX/iaWdb6r1k07TowEmqcr/zLOb90X+oXXkH9pL/qG95B/aS/6hveQf2kv+ob3kH9pL/qG95B/a63z+AYB2GVxp+g5koClNzz8AAAAAAAAAAAAAAAAAAMBF21P7y2fLpGp++nZy/HCS7qj6neHziJMbh69XfyqqZr8r6m5jeebOMXcwpvcbvvv6pm+brf/ZHc3W31xJtl5LMtftXrz+itPr79+7+W++7z03ZoExPfRks/V/3Wm2/sJB8kk1/8yNmn/K3DZ8Hz3/9KvzN2b9l38ZcwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABMzG8BAAD//8n0bSk=") r1 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000d80), 0x10000, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000e40)=@IORING_OP_OPENAT2={0x1c, 0x44, 0x0, r2, &(0x7f0000000dc0)={0x80080, 0x8a, 0x10}, &(0x7f0000000e00)='mnt/encrypted_dir/file\x00', 0x18, 0x0, 0x12345}, 0x9) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0x7, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x5f}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x2}, @cb_func={0x18, 0x5, 0x4, 0x0, 0x3}, @cb_func={0x18, 0x6, 0x4, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0x3, 0xae, &(0x7f0000000080)=""/174, 0x41000, 0x18, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000140)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x0, 0x1, 0x1b, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r1, r1, r1]}, 0x80) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r5 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r5, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r5, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r4, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca7e4d5d5bdbe70000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r3, @ANYBLOB="799cb33c44"], 0x20000600}}, 0x0) r6 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) syz_io_uring_submit(r7, r8, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r9}}, 0x10001) syz_io_uring_submit(r7, 0x0, &(0x7f0000000600)=@IORING_OP_EPOLL_CTL=@mod={0x1d, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000400)={0x1}, r3, 0x3, 0x0, 0x1}, 0x12) syz_io_uring_submit(r7, r8, &(0x7f0000000640)=@IORING_OP_FSYNC={0x3, 0x12, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x1}, 0x971) r10 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(r7, 0x0, &(0x7f0000000d40)=@IORING_OP_RECVMSG={0xa, 0x26, 0x0, r0, 0x0, &(0x7f0000000d00)={&(0x7f0000000780)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000800)=""/82, 0x52}, {&(0x7f0000000200)=""/8, 0x8}, {&(0x7f0000000600)=""/12, 0xc}, {&(0x7f0000000880)=""/113, 0x71}, {&(0x7f0000000900)=""/124, 0x7c}, {&(0x7f0000000980)=""/164, 0xa4}, {&(0x7f0000000a40)=""/238, 0xee}, {&(0x7f0000000b40)=""/5, 0x5}, {&(0x7f0000000b80)=""/164, 0xa4}], 0x9}, 0x0, 0x40002000, 0x0, {0x3, r10}}, 0x80000000) r11 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r11, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r12 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x30c42, 0x180) write(r12, &(0x7f0000000740)='foo', 0x3) 12:45:08 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000001400)='}', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) shutdown(r0, 0x1) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f00000000c0), 0x4) 12:45:08 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000d80), 0x10000, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000e40)=@IORING_OP_OPENAT2={0x1c, 0x44, 0x0, r2, &(0x7f0000000dc0)={0x80080, 0x8a, 0x10}, &(0x7f0000000e00)='mnt/encrypted_dir/file\x00', 0x18, 0x0, 0x12345}, 0x9) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0x7, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x5f}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x2}, @cb_func={0x18, 0x5, 0x4, 0x0, 0x3}, @cb_func={0x18, 0x6, 0x4, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0x3, 0xae, &(0x7f0000000080)=""/174, 0x41000, 0x18, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000140)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x0, 0x1, 0x1b, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r1, r1, r1]}, 0x80) (async) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) (async) r5 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r5, &(0x7f0000000000), 0x10) (async) sendmsg$can_bcm(r5, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r4, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca7e4d5d5bdbe70000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r3, @ANYBLOB="799cb33c44"], 0x20000600}}, 0x0) r6 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) syz_io_uring_submit(r7, r8, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r9}}, 0x10001) syz_io_uring_submit(r7, 0x0, &(0x7f0000000600)=@IORING_OP_EPOLL_CTL=@mod={0x1d, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000400)={0x1}, r3, 0x3, 0x0, 0x1}, 0x12) (async) syz_io_uring_submit(r7, r8, &(0x7f0000000640)=@IORING_OP_FSYNC={0x3, 0x12, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x1}, 0x971) (async) r10 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(r7, 0x0, &(0x7f0000000d40)=@IORING_OP_RECVMSG={0xa, 0x26, 0x0, r0, 0x0, &(0x7f0000000d00)={&(0x7f0000000780)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000800)=""/82, 0x52}, {&(0x7f0000000200)=""/8, 0x8}, {&(0x7f0000000600)=""/12, 0xc}, {&(0x7f0000000880)=""/113, 0x71}, {&(0x7f0000000900)=""/124, 0x7c}, {&(0x7f0000000980)=""/164, 0xa4}, {&(0x7f0000000a40)=""/238, 0xee}, {&(0x7f0000000b40)=""/5, 0x5}, {&(0x7f0000000b80)=""/164, 0xa4}], 0x9}, 0x0, 0x40002000, 0x0, {0x3, r10}}, 0x80000000) r11 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r11, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) r12 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x30c42, 0x180) write(r12, &(0x7f0000000740)='foo', 0x3) 12:45:08 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x20}) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000012, 0x28011, r0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r2, 0x7}) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x58}, [@ldst={0x6, 0x0, 0x2}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3e0, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x76}, 0x48) 12:45:08 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x5) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=ANY=[@ANYBLOB="3c0000002800666f82270d000000f7ffffffffffffff00", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000b000100666c6f7765720000040002000600050000090000"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000440)={&(0x7f0000000900)=ANY=[@ANYBLOB="800100006d00200026bd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x180}, 0x1, 0x0, 0x0, 0x40081}, 0x4000800) connect$can_bcm(r2, &(0x7f0000000000), 0x10) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000880), 0x222800) ioctl$FIBMAP(r3, 0x1, &(0x7f00000008c0)=0x1f) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3b0a08bd17"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$can_bcm(r2, &(0x7f00000003c0)={&(0x7f0000000280)={0x1d, r1}, 0x10, &(0x7f0000000300)={&(0x7f0000001a40)=ANY=[@ANYBLOB="02000000200000000100000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="000000a0010000000200008000000448156a396d2009612106d10378dc6cc0f15b7a6651f6dac41d04d85fdacb265114addf13a7a7710db2bb4a2fffffffff3ac90bdcc30d7091b072b259db8f2ba447edbfcc88f1c2ea31d10f4f7468d8b4071f4645c2c5c32e2b17e75daf539a3ae838d93000da567783f866619ff6370b842fd6e04aa0582ecf5e3e7812e771f8610100000001000000a495a97db7fec8b0"], 0x80}, 0x1, 0x0, 0x0, 0x4004000}, 0x40) r4 = creat(&(0x7f0000000200)='./bus\x00', 0x200) r5 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x39}}}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001b40)={{r6, 0x2, 0x0, 0x0, 0x7fd, 0xfffffffffffffffa, 0x2, 0x5, 0x80000000, 0x0, 0x96e, 0x2, 0x3, 0x8, 0x6}}) ftruncate(r4, 0x800) lseek(r4, 0x200, 0x0) r7 = socket(0x2, 0x2, 0x1) r8 = socket(0x10, 0x803, 0x0) getsockname$packet(r8, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=ANY=[@ANYBLOB="4000000010003904000000008000000000000000", @ANYRES32=0x0, @ANYBLOB="01980000000000002000128008000100677265001400028008000100", @ANYRES32=r9, @ANYBLOB="08000700ac1e0001"], 0x40}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r10, 0x81f8943c, &(0x7f00000017c0)) sendto$packet(0xffffffffffffffff, &(0x7f0000000b00)='*\x00\x00\x00\x00\x00\x00\x00', 0x8, 0x0, &(0x7f0000000000)={0x3, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ccfb7708ffca"}, 0x2) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r7, 0x80047210, &(0x7f0000000400)) r11 = open(&(0x7f0000000000)='./bus\x00', 0x66140, 0x0) sendfile(r4, r11, 0x0, 0xee00) 12:45:08 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x5) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=ANY=[@ANYBLOB="3c0000002800666f82270d000000f7ffffffffffffff00", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000b000100666c6f7765720000040002000600050000090000"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000440)={&(0x7f0000000900)=ANY=[@ANYBLOB="800100006d00200026bd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x180}, 0x1, 0x0, 0x0, 0x40081}, 0x4000800) connect$can_bcm(r2, &(0x7f0000000000), 0x10) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000880), 0x222800) ioctl$FIBMAP(r3, 0x1, &(0x7f00000008c0)=0x1f) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3b0a08bd17"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$can_bcm(r2, &(0x7f00000003c0)={&(0x7f0000000280)={0x1d, r1}, 0x10, &(0x7f0000000300)={&(0x7f0000001a40)=ANY=[@ANYBLOB="02000000200000000100000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="000000a0010000000200008000000448156a396d2009612106d10378dc6cc0f15b7a6651f6dac41d04d85fdacb265114addf13a7a7710db2bb4a2fffffffff3ac90bdcc30d7091b072b259db8f2ba447edbfcc88f1c2ea31d10f4f7468d8b4071f4645c2c5c32e2b17e75daf539a3ae838d93000da567783f866619ff6370b842fd6e04aa0582ecf5e3e7812e771f8610100000001000000a495a97db7fec8b0"], 0x80}, 0x1, 0x0, 0x0, 0x4004000}, 0x40) r4 = creat(&(0x7f0000000200)='./bus\x00', 0x200) r5 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x39}}}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001b40)={{r6, 0x2, 0x0, 0x0, 0x7fd, 0xfffffffffffffffa, 0x2, 0x5, 0x80000000, 0x0, 0x96e, 0x2, 0x3, 0x8, 0x6}}) ftruncate(r4, 0x800) lseek(r4, 0x200, 0x0) r7 = socket(0x2, 0x2, 0x1) r8 = socket(0x10, 0x803, 0x0) getsockname$packet(r8, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=ANY=[@ANYBLOB="4000000010003904000000008000000000000000", @ANYRES32=0x0, @ANYBLOB="01980000000000002000128008000100677265001400028008000100", @ANYRES32=r9, @ANYBLOB="08000700ac1e0001"], 0x40}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r10, 0x81f8943c, &(0x7f00000017c0)) sendto$packet(0xffffffffffffffff, &(0x7f0000000b00)='*\x00\x00\x00\x00\x00\x00\x00', 0x8, 0x0, &(0x7f0000000000)={0x3, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ccfb7708ffca"}, 0x2) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r7, 0x80047210, &(0x7f0000000400)) r11 = open(&(0x7f0000000000)='./bus\x00', 0x66140, 0x0) sendfile(r4, r11, 0x0, 0xee00) 12:45:08 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x5) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=ANY=[@ANYBLOB="3c0000002800666f82270d000000f7ffffffffffffff00", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000b000100666c6f7765720000040002000600050000090000"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000440)={&(0x7f0000000900)=ANY=[@ANYBLOB="800100006d00200026bd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="34000200004001001400350067656e657665310000000000000000000800250003000000440116802c000180100006000100000009000000040000000c000300fbffffff200000000c0003000000008080000000540001800c00050004000000c1ffffff0c00090000900000010100000c000700ff0f00005d0b00000c00050003000000090000000c000900016000000900000014000a00010000000000000009000000000000002c00018014000a000100000000000000010400000000000014000b00ffff00000000000005000000000000009400018014000a00000000000000000001040000000000002800010000100c004c1bf17e4ceb00000000000000000000000000000000000000000000000000000c000300020000000010000010000200070000007e010000050000ffffec145a40000000030000000c00040001000000ff00000014000b001c05e1ffffffffff00000000000000000c0003000600000000000000"], 0x180}, 0x1, 0x0, 0x0, 0x40081}, 0x4000800) connect$can_bcm(r2, &(0x7f0000000000), 0x10) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000880), 0x222800) ioctl$FIBMAP(r3, 0x1, &(0x7f00000008c0)=0x1f) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3b0a08bd17"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$can_bcm(r2, &(0x7f00000003c0)={&(0x7f0000000280)={0x1d, r1}, 0x10, &(0x7f0000000300)={&(0x7f0000001a40)=ANY=[@ANYBLOB="02000000200000000100000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="000000a0010000000200008000000448156a396d2009612106d10378dc6cc0f15b7a6651f6dac41d04d85fdacb265114addf13a7a7710db2bb4a2fffffffff3ac90bdcc30d7091b072b259db8f2ba447edbfcc88f1c2ea31d10f4f7468d8b4071f4645c2c5c32e2b17e75daf539a3ae838d93000da567783f866619ff6370b842fd6e04aa0582ecf5e3e7812e771f8610100000001000000a495a97db7fec8b0"], 0x80}, 0x1, 0x0, 0x0, 0x4004000}, 0x40) r4 = creat(&(0x7f0000000200)='./bus\x00', 0x200) r5 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x39}}}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001b40)={{r6, 0x2, 0x0, 0x0, 0x7fd, 0xfffffffffffffffa, 0x2, 0x5, 0x80000000, 0x0, 0x96e, 0x2, 0x3, 0x8, 0x6}}) ftruncate(r4, 0x800) lseek(r4, 0x200, 0x0) r7 = socket(0x2, 0x2, 0x1) r8 = socket(0x10, 0x803, 0x0) getsockname$packet(r8, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=ANY=[@ANYBLOB="4000000010003904000000008000000000000000", @ANYRES32=0x0, @ANYBLOB="01980000000000002000128008000100677265001400028008000100", @ANYRES32=r9, @ANYBLOB="08000700ac1e0001"], 0x40}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r10, 0x81f8943c, &(0x7f00000017c0)) sendto$packet(0xffffffffffffffff, &(0x7f0000000b00)='*\x00\x00\x00\x00\x00\x00\x00', 0x8, 0x0, &(0x7f0000000000)={0x3, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ccfb7708ffca"}, 0x2) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r7, 0x80047210, &(0x7f0000000400)) r11 = open(&(0x7f0000000000)='./bus\x00', 0x66140, 0x0) sendfile(r4, r11, 0x0, 0xee00) 12:45:08 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000d80), 0x10000, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000e40)=@IORING_OP_OPENAT2={0x1c, 0x44, 0x0, r2, &(0x7f0000000dc0)={0x80080, 0x8a, 0x10}, &(0x7f0000000e00)='mnt/encrypted_dir/file\x00', 0x18, 0x0, 0x12345}, 0x9) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0x7, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x5f}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x2}, @cb_func={0x18, 0x5, 0x4, 0x0, 0x3}, @cb_func={0x18, 0x6, 0x4, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0x3, 0xae, &(0x7f0000000080)=""/174, 0x41000, 0x18, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000140)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x0, 0x1, 0x1b, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r1, r1, r1]}, 0x80) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) (async) r5 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r5, &(0x7f0000000000), 0x10) (async) sendmsg$can_bcm(r5, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r4, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca7e4d5d5bdbe70000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r3, @ANYBLOB="799cb33c44"], 0x20000600}}, 0x0) (async) r6 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) syz_io_uring_submit(r7, r8, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r9}}, 0x10001) syz_io_uring_submit(r7, 0x0, &(0x7f0000000600)=@IORING_OP_EPOLL_CTL=@mod={0x1d, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000400)={0x1}, r3, 0x3, 0x0, 0x1}, 0x12) (async) syz_io_uring_submit(r7, r8, &(0x7f0000000640)=@IORING_OP_FSYNC={0x3, 0x12, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x1}, 0x971) (async) r10 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(r7, 0x0, &(0x7f0000000d40)=@IORING_OP_RECVMSG={0xa, 0x26, 0x0, r0, 0x0, &(0x7f0000000d00)={&(0x7f0000000780)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000800)=""/82, 0x52}, {&(0x7f0000000200)=""/8, 0x8}, {&(0x7f0000000600)=""/12, 0xc}, {&(0x7f0000000880)=""/113, 0x71}, {&(0x7f0000000900)=""/124, 0x7c}, {&(0x7f0000000980)=""/164, 0xa4}, {&(0x7f0000000a40)=""/238, 0xee}, {&(0x7f0000000b40)=""/5, 0x5}, {&(0x7f0000000b80)=""/164, 0xa4}], 0x9}, 0x0, 0x40002000, 0x0, {0x3, r10}}, 0x80000000) (async) r11 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r11, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r12 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x30c42, 0x180) write(r12, &(0x7f0000000740)='foo', 0x3) 12:45:08 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000001400)='}', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) shutdown(r0, 0x1) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f00000000c0), 0x4) 12:45:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$eJzs3TFoM2UcBvDnLomf/b4gVRdBUEFEtFDqJrjURaEgpYgIKlREXJRWqC1urZOLg84qnVyKuFkdpUtxUQSnqh3qImhxsDjoELlcK9VGFFNz8t3vB5fcJe97//e4e95kOS5Aa00nmU/SSTKTpJekON/grnqZPt3cntpfTgaDx38shu3q7dpZv2tJtpI8mGSvLPJiN9nYffro54NH731jvXfPe7tPTU30IE8dHx0+dvLu4usfLjyw8fmX3y8WmU//D8d1+YoRn3WL5Jb/otj/RNFtegT8E0uvfvBVlftbk9w9zH8vZeqT9+baDXu93P/OX/V964cvbp/kWIHLNxj0qt/ArQHQOmWSfopyNkm9Xpazs/V/+K87V8uXVtdemXlhdX3l+aZnKuCy9JPDRz6+8tG1P+X/u06df+D6VeX/iaWdb6r1k07TowEmqcr/zLOb90X+oXXkH9pL/qG95B/aS/6hveQf2kv+ob3kH9pL/qG95B/a63z+AYB2GVxp+g5koClNzz8AAAAAAAAAAAAAAAAAAMBF21P7y2fLpGp++nZy/HCS7qj6neHziJMbh69XfyqqZr8r6m5jeebOMXcwpvcbvvv6pm+brf/ZHc3W31xJtl5LMtftXrz+itPr79+7+W++7z03ZoExPfRks/V/3Wm2/sJB8kk1/8yNmn/K3DZ8Hz3/9KvzN2b9l38ZcwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABMzG8BAAD//8n0bSk=") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) mount$9p_fd(0x0, &(0x7f0000000000)='./mnt\x00', &(0x7f0000000040), 0x40010, &(0x7f0000000140)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@privport}, {@dfltuid={'dfltuid', 0x3d, r3}}, {@cache_none}], [{@dont_hash}, {@flag='mand'}, {@audit}, {@measure}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@subj_user={'subj_user', 0x3d, '-!\'.'}}]}}) 12:45:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") (async) r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) mount$9p_fd(0x0, &(0x7f0000000000)='./mnt\x00', &(0x7f0000000040), 0x40010, &(0x7f0000000140)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@privport}, {@dfltuid={'dfltuid', 0x3d, r3}}, {@cache_none}], [{@dont_hash}, {@flag='mand'}, {@audit}, {@measure}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@subj_user={'subj_user', 0x3d, '-!\'.'}}]}}) 12:45:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) (async) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) mount$9p_fd(0x0, &(0x7f0000000000)='./mnt\x00', &(0x7f0000000040), 0x40010, &(0x7f0000000140)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@privport}, {@dfltuid={'dfltuid', 0x3d, r3}}, {@cache_none}], [{@dont_hash}, {@flag='mand'}, {@audit}, {@measure}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@subj_user={'subj_user', 0x3d, '-!\'.'}}]}}) (async) mount$9p_fd(0x0, &(0x7f0000000000)='./mnt\x00', &(0x7f0000000040), 0x40010, &(0x7f0000000140)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@privport}, {@dfltuid={'dfltuid', 0x3d, r3}}, {@cache_none}], [{@dont_hash}, {@flag='mand'}, {@audit}, {@measure}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@subj_user={'subj_user', 0x3d, '-!\'.'}}]}}) 12:45:08 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = memfd_secret(0x0) fcntl$setlease(r0, 0x400, 0x2) 12:45:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000140)=0xffffff87, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000003c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000040)=0x4, 0x4) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22, @local}, 0x10) 12:45:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000140)=0xffffff87, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000003c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000040)=0x4, 0x4) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22, @local}, 0x10) 12:45:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000140)=0xffffff87, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000003c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000040)=0x4, 0x4) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22, @local}, 0x10) 12:45:08 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x5) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=ANY=[@ANYBLOB="3c0000002800666f82270d000000f7ffffffffffffff00", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000b000100666c6f7765720000040002000600050000090000"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000440)={&(0x7f0000000900)=ANY=[@ANYBLOB="800100006d00200026bd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x180}, 0x1, 0x0, 0x0, 0x40081}, 0x4000800) connect$can_bcm(r2, &(0x7f0000000000), 0x10) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000880), 0x222800) ioctl$FIBMAP(r3, 0x1, &(0x7f00000008c0)=0x1f) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3b0a08bd17"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$can_bcm(r2, &(0x7f00000003c0)={&(0x7f0000000280)={0x1d, r1}, 0x10, &(0x7f0000000300)={&(0x7f0000001a40)=ANY=[@ANYBLOB="02000000200000000100000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="000000a0010000000200008000000448156a396d2009612106d10378dc6cc0f15b7a6651f6dac41d04d85fdacb265114addf13a7a7710db2bb4a2fffffffff3ac90bdcc30d7091b072b259db8f2ba447edbfcc88f1c2ea31d10f4f7468d8b4071f4645c2c5c32e2b17e75daf539a3ae838d93000da567783f866619ff6370b842fd6e04aa0582ecf5e3e7812e771f8610100000001000000a495a97db7fec8b0"], 0x80}, 0x1, 0x0, 0x0, 0x4004000}, 0x40) r4 = creat(&(0x7f0000000200)='./bus\x00', 0x200) r5 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x39}}}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001b40)={{r6, 0x2, 0x0, 0x0, 0x7fd, 0xfffffffffffffffa, 0x2, 0x5, 0x80000000, 0x0, 0x96e, 0x2, 0x3, 0x8, 0x6}}) ftruncate(r4, 0x800) lseek(r4, 0x200, 0x0) r7 = socket(0x2, 0x2, 0x1) r8 = socket(0x10, 0x803, 0x0) getsockname$packet(r8, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=ANY=[@ANYBLOB="4000000010003904000000008000000000000000", @ANYRES32=0x0, @ANYBLOB="01980000000000002000128008000100677265001400028008000100", @ANYRES32=r9, @ANYBLOB="08000700ac1e0001"], 0x40}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r10, 0x81f8943c, &(0x7f00000017c0)) sendto$packet(0xffffffffffffffff, &(0x7f0000000b00)='*\x00\x00\x00\x00\x00\x00\x00', 0x8, 0x0, &(0x7f0000000000)={0x3, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ccfb7708ffca"}, 0x2) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r7, 0x80047210, &(0x7f0000000400)) r11 = open(&(0x7f0000000000)='./bus\x00', 0x66140, 0x0) sendfile(r4, r11, 0x0, 0xee00) 12:45:08 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x20}) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000012, 0x28011, r0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r2, 0x7}) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x58}, [@ldst={0x6, 0x0, 0x2}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3e0, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x76}, 0x48) 12:45:14 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x5) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=ANY=[@ANYBLOB="3c0000002800666f82270d000000f7ffffffffffffff00", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000b000100666c6f7765720000040002000600050000090000"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000440)={&(0x7f0000000900)=ANY=[@ANYBLOB="800100006d00200026bd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x180}, 0x1, 0x0, 0x0, 0x40081}, 0x4000800) connect$can_bcm(r2, &(0x7f0000000000), 0x10) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000880), 0x222800) ioctl$FIBMAP(r3, 0x1, &(0x7f00000008c0)=0x1f) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3b0a08bd17"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$can_bcm(r2, &(0x7f00000003c0)={&(0x7f0000000280)={0x1d, r1}, 0x10, &(0x7f0000000300)={&(0x7f0000001a40)=ANY=[@ANYBLOB="02000000200000000100000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="000000a0010000000200008000000448156a396d2009612106d10378dc6cc0f15b7a6651f6dac41d04d85fdacb265114addf13a7a7710db2bb4a2fffffffff3ac90bdcc30d7091b072b259db8f2ba447edbfcc88f1c2ea31d10f4f7468d8b4071f4645c2c5c32e2b17e75daf539a3ae838d93000da567783f866619ff6370b842fd6e04aa0582ecf5e3e7812e771f8610100000001000000a495a97db7fec8b0"], 0x80}, 0x1, 0x0, 0x0, 0x4004000}, 0x40) r4 = creat(&(0x7f0000000200)='./bus\x00', 0x200) r5 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x39}}}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001b40)={{r6, 0x2, 0x0, 0x0, 0x7fd, 0xfffffffffffffffa, 0x2, 0x5, 0x80000000, 0x0, 0x96e, 0x2, 0x3, 0x8, 0x6}}) ftruncate(r4, 0x800) lseek(r4, 0x200, 0x0) r7 = socket(0x2, 0x2, 0x1) r8 = socket(0x10, 0x803, 0x0) getsockname$packet(r8, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=ANY=[@ANYBLOB="4000000010003904000000008000000000000000", @ANYRES32=0x0, @ANYBLOB="01980000000000002000128008000100677265001400028008000100", @ANYRES32=r9, @ANYBLOB="08000700ac1e0001"], 0x40}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r10, 0x81f8943c, &(0x7f00000017c0)) sendto$packet(0xffffffffffffffff, &(0x7f0000000b00)='*\x00\x00\x00\x00\x00\x00\x00', 0x8, 0x0, &(0x7f0000000000)={0x3, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ccfb7708ffca"}, 0x2) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r7, 0x80047210, &(0x7f0000000400)) r11 = open(&(0x7f0000000000)='./bus\x00', 0x66140, 0x0) sendfile(r4, r11, 0x0, 0xee00) 12:45:14 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) syz_clone3(&(0x7f00000016c0)={0x12a4000, &(0x7f0000001480), &(0x7f00000014c0), &(0x7f0000001500)=0x0, {0x2}, &(0x7f0000001540)=""/252, 0xfc, &(0x7f0000001640)=""/4, &(0x7f0000001680)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2, {r3}}, 0x58) r5 = fspick(r1, &(0x7f0000001740)='mnt/encrypted_dir/../file0\x00', 0x1) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="186b442de66e8474a80000003864fbec840000006d0000850000000e0000009500"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64fbec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64fbec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) r9 = fsopen(&(0x7f0000001780)='ocfs2\x00', 0x1) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64fbec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r10}, 0x10) r11 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) statx(r11, &(0x7f00000002c0)='./file0\x00', 0x800, 0x400, &(0x7f0000001040)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r12) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000680)=[{{&(0x7f0000000300)=@file={0x0, './file0/file0/file0\x00'}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000400)="d5593aac8678973b44e52aefccf45aa952ca4e4d710950c2fbf3b9a6d94262ed51dddc11e9c9ebb03752593d9d451f41793cbbbe85a12c74d094c451f9ec248d4b4ac6ff99a9f369", 0x48}, {&(0x7f0000000dc0)="43ef61b0080002bfc60d643e361f192a3e9d5fc22a3ed7fa968f4af87c6dd9c4c5b662275dac011173f0a3dff6bd10800b8795cc87e07f8b38a0ef3b576b21341375a49f25cafadb31e66344a7f6be7d7c7d01f70f4e94663da98e3f07f75fe84e95b782bb2a462d4cba5dfb9487b3fd0b63e528470d3d0050b713dd1bd1f91a050e630a2ff989ee1576126fff40fd3d99ca0a4620e4d27d5b36ae10506bfc1af42e2b265f34cc58cc360de1ef37ad7a9ae3baf2827139c9cda05e5fff0b790a57d08fcc4001c18159fee0776de091", 0xcf}], 0x2, &(0x7f0000002c40)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="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", @ANYRES64=r13, @ANYRES8, @ANYRES16=0x0, @ANYRES64, @ANYBLOB="4fab9553e5f100000021a400000000f9e3f41fb57ef8df6cab8016c9ce3ac08f2b0de792d7c706ed2f665ecc68b681fd7550710201d9751fa4e825662732f3a8c5bb3c2a7bedfc8388942a7f84f543f5aae98830850e4837677f000000000000009a04cf1eae879bfd790286c9fdc84bbb1445bb63447f73451530bcb43cde8f6c3c564ba1157d944311652a7a2a0f2845e931e945ad06149c51b866b68f257690ce1317526ed983323e256a5a8c4356ac469305f77243c338c60fd8bba96a1f6879bca4882eceb9f25ad58553284588166daa45a518c8b071335b5ff014842183b61e1b53c3dfa40a016d104490edff49534a1803a9a7d9c5d7d8de94d8e01525bc0e604a67f48474f6e2aae169f823a96622dc7dafbe14d70fbbd9ad701e9d1f63d8ed02af94e9805e33afb4c93e16574a4831dda9d091d9bdae0f3af6ae0040fd4abb72deca61ad382bdc32bd0af99e520def1dd52786cf68a2bdb235dbd6f8457839"], 0x40, 0x800}}], 0x1, 0x20004805) mount$9p_tcp(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0), 0x40, &(0x7f0000001240)=ANY=[@ANYBLOB='trans=tcp,port=0x0000000000004e21,debug=0x0000000000000098,mmap,dfltgid=', @ANYRESHEX=r13, @ANYBLOB="1405aee400000096641e20da8723eb7e720d0c8c643dc8e6c0faf748655ae3013688e5236a2c411bef20e98623bbf9bf7a60620e741cca51b62fc4c6", @ANYRESDEC, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB, @ANYRESDEC, @ANYBLOB="5ff9505fa227f81b3e68c4a294b6911bcf7c29677ddfaba1efd72892fa16b399afa5f364047c2bb8db582a8ad052535ce6"]) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000fc0)=[{{&(0x7f0000000400)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000900)=[{&(0x7f0000000480)="70e2263e1e136eaa5f0e28ee10fc0d6afabb08cf2cc43dfc17906489ba88137f2a24008d260aa8a80ef900deb3821df04bb2099cefc167918b03de342b4cf041fc8eb09ea781", 0x46}, {&(0x7f0000000500)="7bfbf4d892350d4dc48d8e2f5bc27a9dfc1a451fcad422214254d79f2731a584c7712c6340b9de836e3ca74ea152919e1524adb97289299d4b5da076eba01f4a34690fa14f12e8f8da21f994c77ce2ed6edaac12e21a86dbedf7ac0993c859f198459c75ebb6ecd521de2132e14446671d2506b7ba0591636545547bdaf42072f1467151491468d06e36bebd4e6a5a2d180aa35f0ba7e5a8197cc4cac42d36238748de75f8abfabd4fb02d1c2259069cd77e1ae693ed36a1188d13d263f831132aefc4a38a9a0d6cbe60dab84d624655e6daf516a82612774373a3d453684b339fd5cdb3fd1d4346", 0xe8}, {&(0x7f0000000100)}, {&(0x7f0000000600)="392071c56edaa60e38ed257aaff50f536a52a23729d8362821c583382e366f2ff30ee1910cc99983b6dbe63b9f82b23de98dd12edde59169625400d8b9212c176dd6634a5929c07e3a06aca8d08ca8590a581e02e7565169e77075a07ae4fc164aeeff65a6aeb63511665f7dd5f331dbe88de35e94254c2908d713fbd62399878844590092e9b71b8f02f94184fb1effac3454d317113ccf1d0b87fd962e94b678a777c6aed9d2849be7b7d450f1", 0xae}, {&(0x7f00000006c0)="b0d3399763549d79f71e922b52498df50f6c787cdc97434cebb3b2793bcd4d34285ad895e0d10d27623c752bfe4db75314c3bfbf09dab6e270e4b3840bfeab5b3071ba33469f4379234f3a4f9c702c379343737c02bd7c4aa1aa6099e603709ed1d4939b8ae02938283821cb48dc1c2ca0cd467676527d9904ecc15641a5198f0237cfa108d6037d71e3b66764bfae557af25be965f911948754", 0x9a}, {&(0x7f00000007c0)="e5a7297e5ff96f4a4a2cea9bfe553f0b4fb68664d2a2969ffe3fa090254daf9ec158018c8a9b666c6869287481cfb401ac118667fdebbb7d7508b069176db6db3c8a804c7a7edb7967efcb9bbf1aa37e8d5409ee689384186dcad4e45b8013b4514d608f4fe662718da790f006f36e2a445b3411091d4387", 0x78}, {&(0x7f0000000840)="71d27559d9733b15193fee84eb92a0130414c9a74fbfdb21e875adb83a9952d87cbc3f090d764fef7a2e7817cb50b54cf32f410e30579091e901105fe95864c77aa3a3eb6f76dc2de5492ee97bc1e4878abbcc0be2f54fbf0fe6833c571eddbac9d87204f5982c441ca4eb7f9ef067be3ea7e65f8c8745602b645d6858e8ae4f49b62bcdf0e057f6bcd8bc9a9e691193705f6e9f3a4a13850f10c95cc34a22e60bc7", 0xa2}], 0x7, 0x0, 0x0, 0x2010801}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000280)}, {&(0x7f0000000380)="1d32fc21ddf3dea49af35643bf9b1fa598a386b28c62c5ef3547a3e8d88ee7f2a5832386010000800000000008246572cc1e036ef9", 0x35}, {&(0x7f0000000a00)="85bc6c15a10a0a0ee38eb82b3e25f69345c14309adadd2786edc677c0924cc654ea2bfb6bb3758fe80b8faa4ed4bcc1449097331674ee4cf4b3c9f7907c5e14b41e69423f4164f9bc4b7f3cfcd0ce8d2784fff1ce0301073848ca80ccafc3423fae7049e2568cbc1cd62cdde017e77a0cc4811d5c92cc7cffcce23a7d71133061bc312005acebcd67de1f66d45aa0490eed0bbcf28aff9fe93dc3a0c821f79f7300d", 0xa2}, {&(0x7f0000000ac0)="7265663f0ef1759e7159f8f7f550e0e65297df8cf451f019e0b5d315cba00f5a47", 0x21}, {&(0x7f0000000c00)="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", 0xff}, {&(0x7f0000000d00)="1d", 0x1}], 0x6, &(0x7f0000000f40)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r12, r13}}}], 0x40, 0x80}}], 0x2, 0x20000000) r14 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(r2, &(0x7f00000018c0)=[{{&(0x7f0000000000)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000a00)=[{&(0x7f0000000080)="862fe589d54f798cfef6519af45af5799859324ebb49f03d187d382151097f7465af9272b0ef61f7c1bbd9076afea662bbbf1ddd58fcaf008e46209b67f274b62ed791aaa5a6d495d96ee3f1916b61946cbb84c4965a008fbbb3b832d63737231648334aab3da237142ff18184ff5c1ad47e01c9788fcc6d2b75f1dd538b924a97ad9ae3fde858d7ac0a3c3eb0ec91f918d3e8048aaf896e2aef90403d7d71fc991226c0e98e2f6aeec3543201561ac6a4b7a3da6a7878515670b03c", 0xbc}, {&(0x7f0000000140)="e84b56eab996d7ab2d4dd08112ff5e1df60965874606d594a2a69bdb50a6b9e7d1d50f3206098362c8ac92747920fd173941b533044224df28d68d3c0fc2ed3f28a822b8241bffc74ef3060bcd9fceafb2a2263650f16ac39b5aedb740c220f3f0f7080fc9de8f9340bebfe7dd39416cceb51778eabbe6c612eacffd5d6e361d3881368a5692a27eb4cbed12b902d3277cf52c3054633c66b3f0dd1229f281f5c512f8916cb1d16254c0c29721d3b2e2cc097aed804496bdaa90d2d28c6a407f37b7c85079af103fa1200e9c1eed19e57fd9911d6fe65ffed26dbacbfb9c6d631c31a8272f0e0f8cfd7ccca5b8da949564bde63d8618c5", 0xf7}, {&(0x7f0000000780)="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", 0xfc}, {&(0x7f0000000880)="b034ff7cf012b8acacf131e9c4bbfd788eeebf55cc6b57567f834fc846f42f6bbc27bb07fcf579e498e5fc4dfe2ea1d1fe25901d200c8265094c4c0e84ab158ca8eebfaaaac2a915", 0x48}, {&(0x7f0000000900)="70ef4b7671482462fb373ccb814b5254eb74a5c370bcc488b0af05d550a0b65591a6dbec88807ec81788696678dd8863fa5d175550c7b8000351072800023f8ba9400f9522476c44a6cb54899a848c8b93796101cb521ac4035a8024e23302db0ed4dfdab9e71bca5065a31232d4e22ba8706879245261823a2677d8f1972e0f24dc49e1ce3ab9d61c2a9721dd5ff486a88436b9794e63c64873a84a2471812b384bf413dcbafafaacd638ddc64087", 0xaf}, {&(0x7f00000009c0)}], 0x6, &(0x7f0000000fc0)=[@rights={{0x1c, 0x1, 0x1, [r1, 0xffffffffffffffff, r3]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x1c}}], 0x118, 0x8000}}, {{&(0x7f0000001100)=@file={0x0, './mnt\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001180)="977c90c94473a0e6414792b998ed4e3dc45979f3f69373a2c4b08886110357d2fd4d2ceff7d2b8b8cdd1d551aef50c883fc86208167733168221a1b0c1b0e43004cadad0a1124eb5d7e80ee86d3861f76d55c8255c63d76b697a0af812089661bcceb881b010b221644826edd35a3ed68c5eb4c07699209aacd74507dc03739ff6db5b5a7d754d291d0439f08489e83ddf5b7da6ea4f603b51f61c001739f5b0efb92cda0706caaf477146c868c18c0bb38291", 0xb3}, {&(0x7f0000001240)="828d002174b96c456e396041b01226348f28ab3df1c73db9c225eb609d03e15ef85cf1c502ede4d2682556", 0x2b}, {&(0x7f0000001280)="0358bf15f35e5ee774ae15f48f7ba0fde0fb473808119d926e6f7140af3f1454f27f76d46e6738f749eff343c86d761dcda1ef20614b6ccf931432b0dbf542057397662f2db414f4854d214207a080f81cc12823cacaa23cf1b79547f37a3460d7c4a70aa3912c2752b3287f87933467a660a68731c4728d391c1b018debb842d211c506ffae8f691d04fef3bf8b551de4239078303b0d272db1acd9fd5c1b31ba62", 0xa2}, {&(0x7f0000001340)="89cc8e849a87ff7ff6273a27106704b21936f5c56fcf35d606bdc6900c3ddbd863824dae8c393d183d156da06810b41783720c8617c62969f91fff118d4ff82fdcb274c5906d0c2653df23c80e9ed618f526961693a7631b7c86aa3cce832ebf3256646f0cc5fcb43de7b4c4d827a44844c3e52da9489d62b9ce3446f6686be7d4f91b1ba0450d285f11f439efd5784543a3bd9dc898bfeb4b11f52af5d5f46ac3320bc6aa2df12734b0b2a39b36cd83d1febdd1185cd69e7514961c78955ecc1ea8797d5c03320c071a6512a82990dca8f8de21cf67c0fb175d78db4746e8cfc47e0b7b8759e05b07dfaf", 0xeb}], 0x4, &(0x7f0000001940)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r1, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r4, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r2, @ANYRES32=r7, @ANYRES32, @ANYRES32=r8, @ANYBLOB="34000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r1, @ANYRES32, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r9, @ANYRES32=r10, @ANYRES32=r2, @ANYRES32=r1, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=r12, @ANYRES32, @ANYBLOB="0000000014000000000000000100000001000000865aec653f73e71c35c04641d2ae4b1191d18bfd68d6dbd92016b4b1c30650621984de668a1e029d6f59997fed015a6f69f68d3669578ba9179418035db444160acd84f8e577614fd11a3c3cf0c2", @ANYRES32=r14, @ANYBLOB='\x00\x00\x00\x00'], 0xd8, 0x4000000}}], 0x2, 0x4810) write(r3, &(0x7f0000000740)='foo', 0x3) 12:45:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000140)=0xffffff87, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000003c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000040)=0x4, 0x4) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22, @local}, 0x10) 12:45:14 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x5) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=ANY=[@ANYBLOB="3c0000002800666f82270d000000f7ffffffffffffff00", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000b000100666c6f7765720000040002000600050000090000"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000440)={&(0x7f0000000900)=ANY=[@ANYBLOB="800100006d00200026bd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x180}, 0x1, 0x0, 0x0, 0x40081}, 0x4000800) connect$can_bcm(r2, &(0x7f0000000000), 0x10) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000880), 0x222800) ioctl$FIBMAP(r3, 0x1, &(0x7f00000008c0)=0x1f) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3b0a08bd17"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$can_bcm(r2, &(0x7f00000003c0)={&(0x7f0000000280)={0x1d, r1}, 0x10, &(0x7f0000000300)={&(0x7f0000001a40)=ANY=[@ANYBLOB="02000000200000000100000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="000000a0010000000200008000000448156a396d2009612106d10378dc6cc0f15b7a6651f6dac41d04d85fdacb265114addf13a7a7710db2bb4a2fffffffff3ac90bdcc30d7091b072b259db8f2ba447edbfcc88f1c2ea31d10f4f7468d8b4071f4645c2c5c32e2b17e75daf539a3ae838d93000da567783f866619ff6370b842fd6e04aa0582ecf5e3e7812e771f8610100000001000000a495a97db7fec8b0"], 0x80}, 0x1, 0x0, 0x0, 0x4004000}, 0x40) r4 = creat(&(0x7f0000000200)='./bus\x00', 0x200) r5 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x39}}}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001b40)={{r6, 0x2, 0x0, 0x0, 0x7fd, 0xfffffffffffffffa, 0x2, 0x5, 0x80000000, 0x0, 0x96e, 0x2, 0x3, 0x8, 0x6}}) ftruncate(r4, 0x800) lseek(r4, 0x200, 0x0) r7 = socket(0x2, 0x2, 0x1) r8 = socket(0x10, 0x803, 0x0) getsockname$packet(r8, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=ANY=[@ANYBLOB="4000000010003904000000008000000000000000", @ANYRES32=0x0, @ANYBLOB="01980000000000002000128008000100677265001400028008000100", @ANYRES32=r9, @ANYBLOB="08000700ac1e0001"], 0x40}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r10, 0x81f8943c, &(0x7f00000017c0)) sendto$packet(0xffffffffffffffff, &(0x7f0000000b00)='*\x00\x00\x00\x00\x00\x00\x00', 0x8, 0x0, &(0x7f0000000000)={0x3, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ccfb7708ffca"}, 0x2) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r7, 0x80047210, &(0x7f0000000400)) r11 = open(&(0x7f0000000000)='./bus\x00', 0x66140, 0x0) sendfile(r4, r11, 0x0, 0xee00) 12:45:14 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x20}) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000012, 0x28011, r0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r2, 0x7}) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x58}, [@ldst={0x6, 0x0, 0x2}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3e0, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x76}, 0x48) 12:45:14 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x5) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=ANY=[@ANYBLOB="3c0000002800666f82270d000000f7ffffffffffffff00", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000b000100666c6f7765720000040002000600050000090000"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000440)={&(0x7f0000000900)=ANY=[@ANYBLOB="800100006d00200026bd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x180}, 0x1, 0x0, 0x0, 0x40081}, 0x4000800) connect$can_bcm(r2, &(0x7f0000000000), 0x10) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000880), 0x222800) ioctl$FIBMAP(r3, 0x1, &(0x7f00000008c0)=0x1f) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3b0a08bd17"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$can_bcm(r2, &(0x7f00000003c0)={&(0x7f0000000280)={0x1d, r1}, 0x10, &(0x7f0000000300)={&(0x7f0000001a40)=ANY=[@ANYBLOB="02000000200000000100000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="000000a0010000000200008000000448156a396d2009612106d10378dc6cc0f15b7a6651f6dac41d04d85fdacb265114addf13a7a7710db2bb4a2fffffffff3ac90bdcc30d7091b072b259db8f2ba447edbfcc88f1c2ea31d10f4f7468d8b4071f4645c2c5c32e2b17e75daf539a3ae838d93000da567783f866619ff6370b842fd6e04aa0582ecf5e3e7812e771f8610100000001000000a495a97db7fec8b0"], 0x80}, 0x1, 0x0, 0x0, 0x4004000}, 0x40) r4 = creat(&(0x7f0000000200)='./bus\x00', 0x200) r5 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x39}}}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001b40)={{r6, 0x2, 0x0, 0x0, 0x7fd, 0xfffffffffffffffa, 0x2, 0x5, 0x80000000, 0x0, 0x96e, 0x2, 0x3, 0x8, 0x6}}) ftruncate(r4, 0x800) lseek(r4, 0x200, 0x0) r7 = socket(0x2, 0x2, 0x1) r8 = socket(0x10, 0x803, 0x0) getsockname$packet(r8, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=ANY=[@ANYBLOB="4000000010003904000000008000000000000000", @ANYRES32=0x0, @ANYBLOB="01980000000000002000128008000100677265001400028008000100", @ANYRES32=r9, @ANYBLOB="08000700ac1e0001"], 0x40}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r10, 0x81f8943c, &(0x7f00000017c0)) sendto$packet(0xffffffffffffffff, &(0x7f0000000b00)='*\x00\x00\x00\x00\x00\x00\x00', 0x8, 0x0, &(0x7f0000000000)={0x3, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ccfb7708ffca"}, 0x2) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r7, 0x80047210, &(0x7f0000000400)) r11 = open(&(0x7f0000000000)='./bus\x00', 0x66140, 0x0) sendfile(r4, r11, 0x0, 0xee00) 12:45:14 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2a8, &(0x7f0000000500)="$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") mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x20) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000180)={0x1, 0x0, 0x7f, 0x0, @vifc_lcl_ifindex, @broadcast}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x9, 0x6, &(0x7f00000003c0)=@raw=[@cb_func={0x18, 0x9, 0x4, 0x0, 0x4}, @func, @map_idx={0x18, 0xa, 0x5, 0x0, 0xa}, @func={0x85, 0x0, 0x1, 0x0, 0x2}], &(0x7f0000000400)='syzkaller\x00', 0x5, 0x40, &(0x7f0000000440)=""/64, 0x40f00, 0x4, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000480)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x10, 0x1ff, 0x8}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) writev(r1, 0x0, 0x0) fallocate(r1, 0x9, 0x2, 0xba) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000380), 0x1040c) recvmmsg(r4, &(0x7f0000000000), 0x0, 0x2000, &(0x7f00000000c0)={0x0, 0x3938700}) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000540)) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r6, &(0x7f0000000000)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x35, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) 12:45:14 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) r2 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) r3 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) syz_clone3(&(0x7f00000016c0)={0x12a4000, &(0x7f0000001480), &(0x7f00000014c0), &(0x7f0000001500)=0x0, {0x2}, &(0x7f0000001540)=""/252, 0xfc, &(0x7f0000001640)=""/4, &(0x7f0000001680)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2, {r3}}, 0x58) (async, rerun: 32) r5 = fspick(r1, &(0x7f0000001740)='mnt/encrypted_dir/../file0\x00', 0x1) (rerun: 32) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="186b442de66e8474a80000003864fbec840000006d0000850000000e0000009500"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) (async) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64fbec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) (async) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64fbec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) (async) r9 = fsopen(&(0x7f0000001780)='ocfs2\x00', 0x1) (async) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64fbec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r10}, 0x10) r11 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) statx(r11, &(0x7f00000002c0)='./file0\x00', 0x800, 0x400, &(0x7f0000001040)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r12) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000680)=[{{&(0x7f0000000300)=@file={0x0, './file0/file0/file0\x00'}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000400)="d5593aac8678973b44e52aefccf45aa952ca4e4d710950c2fbf3b9a6d94262ed51dddc11e9c9ebb03752593d9d451f41793cbbbe85a12c74d094c451f9ec248d4b4ac6ff99a9f369", 0x48}, {&(0x7f0000000dc0)="43ef61b0080002bfc60d643e361f192a3e9d5fc22a3ed7fa968f4af87c6dd9c4c5b662275dac011173f0a3dff6bd10800b8795cc87e07f8b38a0ef3b576b21341375a49f25cafadb31e66344a7f6be7d7c7d01f70f4e94663da98e3f07f75fe84e95b782bb2a462d4cba5dfb9487b3fd0b63e528470d3d0050b713dd1bd1f91a050e630a2ff989ee1576126fff40fd3d99ca0a4620e4d27d5b36ae10506bfc1af42e2b265f34cc58cc360de1ef37ad7a9ae3baf2827139c9cda05e5fff0b790a57d08fcc4001c18159fee0776de091", 0xcf}], 0x2, &(0x7f0000002c40)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="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", @ANYRES64=r13, @ANYRES8, @ANYRES16=0x0, @ANYRES64, @ANYBLOB="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"], 0x40, 0x800}}], 0x1, 0x20004805) (async) mount$9p_tcp(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0), 0x40, &(0x7f0000001240)=ANY=[@ANYBLOB='trans=tcp,port=0x0000000000004e21,debug=0x0000000000000098,mmap,dfltgid=', @ANYRESHEX=r13, @ANYBLOB="1405aee400000096641e20da8723eb7e720d0c8c643dc8e6c0faf748655ae3013688e5236a2c411bef20e98623bbf9bf7a60620e741cca51b62fc4c6", @ANYRESDEC, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB, @ANYRESDEC, @ANYBLOB="5ff9505fa227f81b3e68c4a294b6911bcf7c29677ddfaba1efd72892fa16b399afa5f364047c2bb8db582a8ad052535ce6"]) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000fc0)=[{{&(0x7f0000000400)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000900)=[{&(0x7f0000000480)="70e2263e1e136eaa5f0e28ee10fc0d6afabb08cf2cc43dfc17906489ba88137f2a24008d260aa8a80ef900deb3821df04bb2099cefc167918b03de342b4cf041fc8eb09ea781", 0x46}, {&(0x7f0000000500)="7bfbf4d892350d4dc48d8e2f5bc27a9dfc1a451fcad422214254d79f2731a584c7712c6340b9de836e3ca74ea152919e1524adb97289299d4b5da076eba01f4a34690fa14f12e8f8da21f994c77ce2ed6edaac12e21a86dbedf7ac0993c859f198459c75ebb6ecd521de2132e14446671d2506b7ba0591636545547bdaf42072f1467151491468d06e36bebd4e6a5a2d180aa35f0ba7e5a8197cc4cac42d36238748de75f8abfabd4fb02d1c2259069cd77e1ae693ed36a1188d13d263f831132aefc4a38a9a0d6cbe60dab84d624655e6daf516a82612774373a3d453684b339fd5cdb3fd1d4346", 0xe8}, {&(0x7f0000000100)}, {&(0x7f0000000600)="392071c56edaa60e38ed257aaff50f536a52a23729d8362821c583382e366f2ff30ee1910cc99983b6dbe63b9f82b23de98dd12edde59169625400d8b9212c176dd6634a5929c07e3a06aca8d08ca8590a581e02e7565169e77075a07ae4fc164aeeff65a6aeb63511665f7dd5f331dbe88de35e94254c2908d713fbd62399878844590092e9b71b8f02f94184fb1effac3454d317113ccf1d0b87fd962e94b678a777c6aed9d2849be7b7d450f1", 0xae}, {&(0x7f00000006c0)="b0d3399763549d79f71e922b52498df50f6c787cdc97434cebb3b2793bcd4d34285ad895e0d10d27623c752bfe4db75314c3bfbf09dab6e270e4b3840bfeab5b3071ba33469f4379234f3a4f9c702c379343737c02bd7c4aa1aa6099e603709ed1d4939b8ae02938283821cb48dc1c2ca0cd467676527d9904ecc15641a5198f0237cfa108d6037d71e3b66764bfae557af25be965f911948754", 0x9a}, {&(0x7f00000007c0)="e5a7297e5ff96f4a4a2cea9bfe553f0b4fb68664d2a2969ffe3fa090254daf9ec158018c8a9b666c6869287481cfb401ac118667fdebbb7d7508b069176db6db3c8a804c7a7edb7967efcb9bbf1aa37e8d5409ee689384186dcad4e45b8013b4514d608f4fe662718da790f006f36e2a445b3411091d4387", 0x78}, {&(0x7f0000000840)="71d27559d9733b15193fee84eb92a0130414c9a74fbfdb21e875adb83a9952d87cbc3f090d764fef7a2e7817cb50b54cf32f410e30579091e901105fe95864c77aa3a3eb6f76dc2de5492ee97bc1e4878abbcc0be2f54fbf0fe6833c571eddbac9d87204f5982c441ca4eb7f9ef067be3ea7e65f8c8745602b645d6858e8ae4f49b62bcdf0e057f6bcd8bc9a9e691193705f6e9f3a4a13850f10c95cc34a22e60bc7", 0xa2}], 0x7, 0x0, 0x0, 0x2010801}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000280)}, {&(0x7f0000000380)="1d32fc21ddf3dea49af35643bf9b1fa598a386b28c62c5ef3547a3e8d88ee7f2a5832386010000800000000008246572cc1e036ef9", 0x35}, {&(0x7f0000000a00)="85bc6c15a10a0a0ee38eb82b3e25f69345c14309adadd2786edc677c0924cc654ea2bfb6bb3758fe80b8faa4ed4bcc1449097331674ee4cf4b3c9f7907c5e14b41e69423f4164f9bc4b7f3cfcd0ce8d2784fff1ce0301073848ca80ccafc3423fae7049e2568cbc1cd62cdde017e77a0cc4811d5c92cc7cffcce23a7d71133061bc312005acebcd67de1f66d45aa0490eed0bbcf28aff9fe93dc3a0c821f79f7300d", 0xa2}, {&(0x7f0000000ac0)="7265663f0ef1759e7159f8f7f550e0e65297df8cf451f019e0b5d315cba00f5a47", 0x21}, {&(0x7f0000000c00)="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", 0xff}, {&(0x7f0000000d00)="1d", 0x1}], 0x6, &(0x7f0000000f40)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r12, r13}}}], 0x40, 0x80}}], 0x2, 0x20000000) (async) r14 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(r2, &(0x7f00000018c0)=[{{&(0x7f0000000000)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000a00)=[{&(0x7f0000000080)="862fe589d54f798cfef6519af45af5799859324ebb49f03d187d382151097f7465af9272b0ef61f7c1bbd9076afea662bbbf1ddd58fcaf008e46209b67f274b62ed791aaa5a6d495d96ee3f1916b61946cbb84c4965a008fbbb3b832d63737231648334aab3da237142ff18184ff5c1ad47e01c9788fcc6d2b75f1dd538b924a97ad9ae3fde858d7ac0a3c3eb0ec91f918d3e8048aaf896e2aef90403d7d71fc991226c0e98e2f6aeec3543201561ac6a4b7a3da6a7878515670b03c", 0xbc}, {&(0x7f0000000140)="e84b56eab996d7ab2d4dd08112ff5e1df60965874606d594a2a69bdb50a6b9e7d1d50f3206098362c8ac92747920fd173941b533044224df28d68d3c0fc2ed3f28a822b8241bffc74ef3060bcd9fceafb2a2263650f16ac39b5aedb740c220f3f0f7080fc9de8f9340bebfe7dd39416cceb51778eabbe6c612eacffd5d6e361d3881368a5692a27eb4cbed12b902d3277cf52c3054633c66b3f0dd1229f281f5c512f8916cb1d16254c0c29721d3b2e2cc097aed804496bdaa90d2d28c6a407f37b7c85079af103fa1200e9c1eed19e57fd9911d6fe65ffed26dbacbfb9c6d631c31a8272f0e0f8cfd7ccca5b8da949564bde63d8618c5", 0xf7}, {&(0x7f0000000780)="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", 0xfc}, {&(0x7f0000000880)="b034ff7cf012b8acacf131e9c4bbfd788eeebf55cc6b57567f834fc846f42f6bbc27bb07fcf579e498e5fc4dfe2ea1d1fe25901d200c8265094c4c0e84ab158ca8eebfaaaac2a915", 0x48}, {&(0x7f0000000900)="70ef4b7671482462fb373ccb814b5254eb74a5c370bcc488b0af05d550a0b65591a6dbec88807ec81788696678dd8863fa5d175550c7b8000351072800023f8ba9400f9522476c44a6cb54899a848c8b93796101cb521ac4035a8024e23302db0ed4dfdab9e71bca5065a31232d4e22ba8706879245261823a2677d8f1972e0f24dc49e1ce3ab9d61c2a9721dd5ff486a88436b9794e63c64873a84a2471812b384bf413dcbafafaacd638ddc64087", 0xaf}, {&(0x7f00000009c0)}], 0x6, &(0x7f0000000fc0)=[@rights={{0x1c, 0x1, 0x1, [r1, 0xffffffffffffffff, r3]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x1c}}], 0x118, 0x8000}}, {{&(0x7f0000001100)=@file={0x0, './mnt\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001180)="977c90c94473a0e6414792b998ed4e3dc45979f3f69373a2c4b08886110357d2fd4d2ceff7d2b8b8cdd1d551aef50c883fc86208167733168221a1b0c1b0e43004cadad0a1124eb5d7e80ee86d3861f76d55c8255c63d76b697a0af812089661bcceb881b010b221644826edd35a3ed68c5eb4c07699209aacd74507dc03739ff6db5b5a7d754d291d0439f08489e83ddf5b7da6ea4f603b51f61c001739f5b0efb92cda0706caaf477146c868c18c0bb38291", 0xb3}, {&(0x7f0000001240)="828d002174b96c456e396041b01226348f28ab3df1c73db9c225eb609d03e15ef85cf1c502ede4d2682556", 0x2b}, {&(0x7f0000001280)="0358bf15f35e5ee774ae15f48f7ba0fde0fb473808119d926e6f7140af3f1454f27f76d46e6738f749eff343c86d761dcda1ef20614b6ccf931432b0dbf542057397662f2db414f4854d214207a080f81cc12823cacaa23cf1b79547f37a3460d7c4a70aa3912c2752b3287f87933467a660a68731c4728d391c1b018debb842d211c506ffae8f691d04fef3bf8b551de4239078303b0d272db1acd9fd5c1b31ba62", 0xa2}, {&(0x7f0000001340)="89cc8e849a87ff7ff6273a27106704b21936f5c56fcf35d606bdc6900c3ddbd863824dae8c393d183d156da06810b41783720c8617c62969f91fff118d4ff82fdcb274c5906d0c2653df23c80e9ed618f526961693a7631b7c86aa3cce832ebf3256646f0cc5fcb43de7b4c4d827a44844c3e52da9489d62b9ce3446f6686be7d4f91b1ba0450d285f11f439efd5784543a3bd9dc898bfeb4b11f52af5d5f46ac3320bc6aa2df12734b0b2a39b36cd83d1febdd1185cd69e7514961c78955ecc1ea8797d5c03320c071a6512a82990dca8f8de21cf67c0fb175d78db4746e8cfc47e0b7b8759e05b07dfaf", 0xeb}], 0x4, &(0x7f0000001940)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r1, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r4, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r2, @ANYRES32=r7, @ANYRES32, @ANYRES32=r8, @ANYBLOB="34000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r1, @ANYRES32, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r9, @ANYRES32=r10, @ANYRES32=r2, @ANYRES32=r1, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=r12, @ANYRES32, @ANYBLOB="0000000014000000000000000100000001000000865aec653f73e71c35c04641d2ae4b1191d18bfd68d6dbd92016b4b1c30650621984de668a1e029d6f59997fed015a6f69f68d3669578ba9179418035db444160acd84f8e577614fd11a3c3cf0c2", @ANYRES32=r14, @ANYBLOB='\x00\x00\x00\x00'], 0xd8, 0x4000000}}], 0x2, 0x4810) (async) write(r3, &(0x7f0000000740)='foo', 0x3) [ 2849.040931][ T2396] 9pnet_fd: Insufficient options for proto=fd 12:45:15 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) (async) r2 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) syz_clone3(&(0x7f00000016c0)={0x12a4000, &(0x7f0000001480), &(0x7f00000014c0), &(0x7f0000001500)=0x0, {0x2}, &(0x7f0000001540)=""/252, 0xfc, &(0x7f0000001640)=""/4, &(0x7f0000001680)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2, {r3}}, 0x58) r5 = fspick(r1, &(0x7f0000001740)='mnt/encrypted_dir/../file0\x00', 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="186b442de66e8474a80000003864fbec840000006d0000850000000e0000009500"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="186b442de66e8474a80000003864fbec840000006d0000850000000e0000009500"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64fbec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64fbec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64fbec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) r9 = fsopen(&(0x7f0000001780)='ocfs2\x00', 0x1) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64fbec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r10}, 0x10) r11 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) statx(r11, &(0x7f00000002c0)='./file0\x00', 0x800, 0x400, &(0x7f0000001040)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r12) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000980), 0x800) (async) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000680)=[{{&(0x7f0000000300)=@file={0x0, './file0/file0/file0\x00'}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000400)="d5593aac8678973b44e52aefccf45aa952ca4e4d710950c2fbf3b9a6d94262ed51dddc11e9c9ebb03752593d9d451f41793cbbbe85a12c74d094c451f9ec248d4b4ac6ff99a9f369", 0x48}, {&(0x7f0000000dc0)="43ef61b0080002bfc60d643e361f192a3e9d5fc22a3ed7fa968f4af87c6dd9c4c5b662275dac011173f0a3dff6bd10800b8795cc87e07f8b38a0ef3b576b21341375a49f25cafadb31e66344a7f6be7d7c7d01f70f4e94663da98e3f07f75fe84e95b782bb2a462d4cba5dfb9487b3fd0b63e528470d3d0050b713dd1bd1f91a050e630a2ff989ee1576126fff40fd3d99ca0a4620e4d27d5b36ae10506bfc1af42e2b265f34cc58cc360de1ef37ad7a9ae3baf2827139c9cda05e5fff0b790a57d08fcc4001c18159fee0776de091", 0xcf}], 0x2, &(0x7f0000002c40)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="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", @ANYRES64=r13, @ANYRES8, @ANYRES16=0x0, @ANYRES64, @ANYBLOB="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"], 0x40, 0x800}}], 0x1, 0x20004805) mount$9p_tcp(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0), 0x40, &(0x7f0000001240)=ANY=[@ANYBLOB='trans=tcp,port=0x0000000000004e21,debug=0x0000000000000098,mmap,dfltgid=', @ANYRESHEX=r13, @ANYBLOB="1405aee400000096641e20da8723eb7e720d0c8c643dc8e6c0faf748655ae3013688e5236a2c411bef20e98623bbf9bf7a60620e741cca51b62fc4c6", @ANYRESDEC, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB, @ANYRESDEC, @ANYBLOB="5ff9505fa227f81b3e68c4a294b6911bcf7c29677ddfaba1efd72892fa16b399afa5f364047c2bb8db582a8ad052535ce6"]) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000fc0)=[{{&(0x7f0000000400)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000900)=[{&(0x7f0000000480)="70e2263e1e136eaa5f0e28ee10fc0d6afabb08cf2cc43dfc17906489ba88137f2a24008d260aa8a80ef900deb3821df04bb2099cefc167918b03de342b4cf041fc8eb09ea781", 0x46}, {&(0x7f0000000500)="7bfbf4d892350d4dc48d8e2f5bc27a9dfc1a451fcad422214254d79f2731a584c7712c6340b9de836e3ca74ea152919e1524adb97289299d4b5da076eba01f4a34690fa14f12e8f8da21f994c77ce2ed6edaac12e21a86dbedf7ac0993c859f198459c75ebb6ecd521de2132e14446671d2506b7ba0591636545547bdaf42072f1467151491468d06e36bebd4e6a5a2d180aa35f0ba7e5a8197cc4cac42d36238748de75f8abfabd4fb02d1c2259069cd77e1ae693ed36a1188d13d263f831132aefc4a38a9a0d6cbe60dab84d624655e6daf516a82612774373a3d453684b339fd5cdb3fd1d4346", 0xe8}, {&(0x7f0000000100)}, {&(0x7f0000000600)="392071c56edaa60e38ed257aaff50f536a52a23729d8362821c583382e366f2ff30ee1910cc99983b6dbe63b9f82b23de98dd12edde59169625400d8b9212c176dd6634a5929c07e3a06aca8d08ca8590a581e02e7565169e77075a07ae4fc164aeeff65a6aeb63511665f7dd5f331dbe88de35e94254c2908d713fbd62399878844590092e9b71b8f02f94184fb1effac3454d317113ccf1d0b87fd962e94b678a777c6aed9d2849be7b7d450f1", 0xae}, {&(0x7f00000006c0)="b0d3399763549d79f71e922b52498df50f6c787cdc97434cebb3b2793bcd4d34285ad895e0d10d27623c752bfe4db75314c3bfbf09dab6e270e4b3840bfeab5b3071ba33469f4379234f3a4f9c702c379343737c02bd7c4aa1aa6099e603709ed1d4939b8ae02938283821cb48dc1c2ca0cd467676527d9904ecc15641a5198f0237cfa108d6037d71e3b66764bfae557af25be965f911948754", 0x9a}, {&(0x7f00000007c0)="e5a7297e5ff96f4a4a2cea9bfe553f0b4fb68664d2a2969ffe3fa090254daf9ec158018c8a9b666c6869287481cfb401ac118667fdebbb7d7508b069176db6db3c8a804c7a7edb7967efcb9bbf1aa37e8d5409ee689384186dcad4e45b8013b4514d608f4fe662718da790f006f36e2a445b3411091d4387", 0x78}, {&(0x7f0000000840)="71d27559d9733b15193fee84eb92a0130414c9a74fbfdb21e875adb83a9952d87cbc3f090d764fef7a2e7817cb50b54cf32f410e30579091e901105fe95864c77aa3a3eb6f76dc2de5492ee97bc1e4878abbcc0be2f54fbf0fe6833c571eddbac9d87204f5982c441ca4eb7f9ef067be3ea7e65f8c8745602b645d6858e8ae4f49b62bcdf0e057f6bcd8bc9a9e691193705f6e9f3a4a13850f10c95cc34a22e60bc7", 0xa2}], 0x7, 0x0, 0x0, 0x2010801}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000280)}, {&(0x7f0000000380)="1d32fc21ddf3dea49af35643bf9b1fa598a386b28c62c5ef3547a3e8d88ee7f2a5832386010000800000000008246572cc1e036ef9", 0x35}, {&(0x7f0000000a00)="85bc6c15a10a0a0ee38eb82b3e25f69345c14309adadd2786edc677c0924cc654ea2bfb6bb3758fe80b8faa4ed4bcc1449097331674ee4cf4b3c9f7907c5e14b41e69423f4164f9bc4b7f3cfcd0ce8d2784fff1ce0301073848ca80ccafc3423fae7049e2568cbc1cd62cdde017e77a0cc4811d5c92cc7cffcce23a7d71133061bc312005acebcd67de1f66d45aa0490eed0bbcf28aff9fe93dc3a0c821f79f7300d", 0xa2}, {&(0x7f0000000ac0)="7265663f0ef1759e7159f8f7f550e0e65297df8cf451f019e0b5d315cba00f5a47", 0x21}, {&(0x7f0000000c00)="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", 0xff}, {&(0x7f0000000d00)="1d", 0x1}], 0x6, &(0x7f0000000f40)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r12, r13}}}], 0x40, 0x80}}], 0x2, 0x20000000) (async) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000fc0)=[{{&(0x7f0000000400)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000900)=[{&(0x7f0000000480)="70e2263e1e136eaa5f0e28ee10fc0d6afabb08cf2cc43dfc17906489ba88137f2a24008d260aa8a80ef900deb3821df04bb2099cefc167918b03de342b4cf041fc8eb09ea781", 0x46}, {&(0x7f0000000500)="7bfbf4d892350d4dc48d8e2f5bc27a9dfc1a451fcad422214254d79f2731a584c7712c6340b9de836e3ca74ea152919e1524adb97289299d4b5da076eba01f4a34690fa14f12e8f8da21f994c77ce2ed6edaac12e21a86dbedf7ac0993c859f198459c75ebb6ecd521de2132e14446671d2506b7ba0591636545547bdaf42072f1467151491468d06e36bebd4e6a5a2d180aa35f0ba7e5a8197cc4cac42d36238748de75f8abfabd4fb02d1c2259069cd77e1ae693ed36a1188d13d263f831132aefc4a38a9a0d6cbe60dab84d624655e6daf516a82612774373a3d453684b339fd5cdb3fd1d4346", 0xe8}, {&(0x7f0000000100)}, {&(0x7f0000000600)="392071c56edaa60e38ed257aaff50f536a52a23729d8362821c583382e366f2ff30ee1910cc99983b6dbe63b9f82b23de98dd12edde59169625400d8b9212c176dd6634a5929c07e3a06aca8d08ca8590a581e02e7565169e77075a07ae4fc164aeeff65a6aeb63511665f7dd5f331dbe88de35e94254c2908d713fbd62399878844590092e9b71b8f02f94184fb1effac3454d317113ccf1d0b87fd962e94b678a777c6aed9d2849be7b7d450f1", 0xae}, {&(0x7f00000006c0)="b0d3399763549d79f71e922b52498df50f6c787cdc97434cebb3b2793bcd4d34285ad895e0d10d27623c752bfe4db75314c3bfbf09dab6e270e4b3840bfeab5b3071ba33469f4379234f3a4f9c702c379343737c02bd7c4aa1aa6099e603709ed1d4939b8ae02938283821cb48dc1c2ca0cd467676527d9904ecc15641a5198f0237cfa108d6037d71e3b66764bfae557af25be965f911948754", 0x9a}, {&(0x7f00000007c0)="e5a7297e5ff96f4a4a2cea9bfe553f0b4fb68664d2a2969ffe3fa090254daf9ec158018c8a9b666c6869287481cfb401ac118667fdebbb7d7508b069176db6db3c8a804c7a7edb7967efcb9bbf1aa37e8d5409ee689384186dcad4e45b8013b4514d608f4fe662718da790f006f36e2a445b3411091d4387", 0x78}, {&(0x7f0000000840)="71d27559d9733b15193fee84eb92a0130414c9a74fbfdb21e875adb83a9952d87cbc3f090d764fef7a2e7817cb50b54cf32f410e30579091e901105fe95864c77aa3a3eb6f76dc2de5492ee97bc1e4878abbcc0be2f54fbf0fe6833c571eddbac9d87204f5982c441ca4eb7f9ef067be3ea7e65f8c8745602b645d6858e8ae4f49b62bcdf0e057f6bcd8bc9a9e691193705f6e9f3a4a13850f10c95cc34a22e60bc7", 0xa2}], 0x7, 0x0, 0x0, 0x2010801}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000280)}, {&(0x7f0000000380)="1d32fc21ddf3dea49af35643bf9b1fa598a386b28c62c5ef3547a3e8d88ee7f2a5832386010000800000000008246572cc1e036ef9", 0x35}, {&(0x7f0000000a00)="85bc6c15a10a0a0ee38eb82b3e25f69345c14309adadd2786edc677c0924cc654ea2bfb6bb3758fe80b8faa4ed4bcc1449097331674ee4cf4b3c9f7907c5e14b41e69423f4164f9bc4b7f3cfcd0ce8d2784fff1ce0301073848ca80ccafc3423fae7049e2568cbc1cd62cdde017e77a0cc4811d5c92cc7cffcce23a7d71133061bc312005acebcd67de1f66d45aa0490eed0bbcf28aff9fe93dc3a0c821f79f7300d", 0xa2}, {&(0x7f0000000ac0)="7265663f0ef1759e7159f8f7f550e0e65297df8cf451f019e0b5d315cba00f5a47", 0x21}, {&(0x7f0000000c00)="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", 0xff}, {&(0x7f0000000d00)="1d", 0x1}], 0x6, &(0x7f0000000f40)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r12, r13}}}], 0x40, 0x80}}], 0x2, 0x20000000) r14 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(r2, &(0x7f00000018c0)=[{{&(0x7f0000000000)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000a00)=[{&(0x7f0000000080)="862fe589d54f798cfef6519af45af5799859324ebb49f03d187d382151097f7465af9272b0ef61f7c1bbd9076afea662bbbf1ddd58fcaf008e46209b67f274b62ed791aaa5a6d495d96ee3f1916b61946cbb84c4965a008fbbb3b832d63737231648334aab3da237142ff18184ff5c1ad47e01c9788fcc6d2b75f1dd538b924a97ad9ae3fde858d7ac0a3c3eb0ec91f918d3e8048aaf896e2aef90403d7d71fc991226c0e98e2f6aeec3543201561ac6a4b7a3da6a7878515670b03c", 0xbc}, {&(0x7f0000000140)="e84b56eab996d7ab2d4dd08112ff5e1df60965874606d594a2a69bdb50a6b9e7d1d50f3206098362c8ac92747920fd173941b533044224df28d68d3c0fc2ed3f28a822b8241bffc74ef3060bcd9fceafb2a2263650f16ac39b5aedb740c220f3f0f7080fc9de8f9340bebfe7dd39416cceb51778eabbe6c612eacffd5d6e361d3881368a5692a27eb4cbed12b902d3277cf52c3054633c66b3f0dd1229f281f5c512f8916cb1d16254c0c29721d3b2e2cc097aed804496bdaa90d2d28c6a407f37b7c85079af103fa1200e9c1eed19e57fd9911d6fe65ffed26dbacbfb9c6d631c31a8272f0e0f8cfd7ccca5b8da949564bde63d8618c5", 0xf7}, {&(0x7f0000000780)="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", 0xfc}, {&(0x7f0000000880)="b034ff7cf012b8acacf131e9c4bbfd788eeebf55cc6b57567f834fc846f42f6bbc27bb07fcf579e498e5fc4dfe2ea1d1fe25901d200c8265094c4c0e84ab158ca8eebfaaaac2a915", 0x48}, {&(0x7f0000000900)="70ef4b7671482462fb373ccb814b5254eb74a5c370bcc488b0af05d550a0b65591a6dbec88807ec81788696678dd8863fa5d175550c7b8000351072800023f8ba9400f9522476c44a6cb54899a848c8b93796101cb521ac4035a8024e23302db0ed4dfdab9e71bca5065a31232d4e22ba8706879245261823a2677d8f1972e0f24dc49e1ce3ab9d61c2a9721dd5ff486a88436b9794e63c64873a84a2471812b384bf413dcbafafaacd638ddc64087", 0xaf}, {&(0x7f00000009c0)}], 0x6, &(0x7f0000000fc0)=[@rights={{0x1c, 0x1, 0x1, [r1, 0xffffffffffffffff, r3]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x1c}}], 0x118, 0x8000}}, {{&(0x7f0000001100)=@file={0x0, './mnt\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001180)="977c90c94473a0e6414792b998ed4e3dc45979f3f69373a2c4b08886110357d2fd4d2ceff7d2b8b8cdd1d551aef50c883fc86208167733168221a1b0c1b0e43004cadad0a1124eb5d7e80ee86d3861f76d55c8255c63d76b697a0af812089661bcceb881b010b221644826edd35a3ed68c5eb4c07699209aacd74507dc03739ff6db5b5a7d754d291d0439f08489e83ddf5b7da6ea4f603b51f61c001739f5b0efb92cda0706caaf477146c868c18c0bb38291", 0xb3}, {&(0x7f0000001240)="828d002174b96c456e396041b01226348f28ab3df1c73db9c225eb609d03e15ef85cf1c502ede4d2682556", 0x2b}, {&(0x7f0000001280)="0358bf15f35e5ee774ae15f48f7ba0fde0fb473808119d926e6f7140af3f1454f27f76d46e6738f749eff343c86d761dcda1ef20614b6ccf931432b0dbf542057397662f2db414f4854d214207a080f81cc12823cacaa23cf1b79547f37a3460d7c4a70aa3912c2752b3287f87933467a660a68731c4728d391c1b018debb842d211c506ffae8f691d04fef3bf8b551de4239078303b0d272db1acd9fd5c1b31ba62", 0xa2}, {&(0x7f0000001340)="89cc8e849a87ff7ff6273a27106704b21936f5c56fcf35d606bdc6900c3ddbd863824dae8c393d183d156da06810b41783720c8617c62969f91fff118d4ff82fdcb274c5906d0c2653df23c80e9ed618f526961693a7631b7c86aa3cce832ebf3256646f0cc5fcb43de7b4c4d827a44844c3e52da9489d62b9ce3446f6686be7d4f91b1ba0450d285f11f439efd5784543a3bd9dc898bfeb4b11f52af5d5f46ac3320bc6aa2df12734b0b2a39b36cd83d1febdd1185cd69e7514961c78955ecc1ea8797d5c03320c071a6512a82990dca8f8de21cf67c0fb175d78db4746e8cfc47e0b7b8759e05b07dfaf", 0xeb}], 0x4, &(0x7f0000001940)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r1, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r4, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r2, @ANYRES32=r7, @ANYRES32, @ANYRES32=r8, @ANYBLOB="34000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r1, @ANYRES32, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r9, @ANYRES32=r10, @ANYRES32=r2, @ANYRES32=r1, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=r12, @ANYRES32, @ANYBLOB="0000000014000000000000000100000001000000865aec653f73e71c35c04641d2ae4b1191d18bfd68d6dbd92016b4b1c30650621984de668a1e029d6f59997fed015a6f69f68d3669578ba9179418035db444160acd84f8e577614fd11a3c3cf0c2", @ANYRES32=r14, @ANYBLOB='\x00\x00\x00\x00'], 0xd8, 0x4000000}}], 0x2, 0x4810) (async) sendmmsg$unix(r2, &(0x7f00000018c0)=[{{&(0x7f0000000000)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000a00)=[{&(0x7f0000000080)="862fe589d54f798cfef6519af45af5799859324ebb49f03d187d382151097f7465af9272b0ef61f7c1bbd9076afea662bbbf1ddd58fcaf008e46209b67f274b62ed791aaa5a6d495d96ee3f1916b61946cbb84c4965a008fbbb3b832d63737231648334aab3da237142ff18184ff5c1ad47e01c9788fcc6d2b75f1dd538b924a97ad9ae3fde858d7ac0a3c3eb0ec91f918d3e8048aaf896e2aef90403d7d71fc991226c0e98e2f6aeec3543201561ac6a4b7a3da6a7878515670b03c", 0xbc}, {&(0x7f0000000140)="e84b56eab996d7ab2d4dd08112ff5e1df60965874606d594a2a69bdb50a6b9e7d1d50f3206098362c8ac92747920fd173941b533044224df28d68d3c0fc2ed3f28a822b8241bffc74ef3060bcd9fceafb2a2263650f16ac39b5aedb740c220f3f0f7080fc9de8f9340bebfe7dd39416cceb51778eabbe6c612eacffd5d6e361d3881368a5692a27eb4cbed12b902d3277cf52c3054633c66b3f0dd1229f281f5c512f8916cb1d16254c0c29721d3b2e2cc097aed804496bdaa90d2d28c6a407f37b7c85079af103fa1200e9c1eed19e57fd9911d6fe65ffed26dbacbfb9c6d631c31a8272f0e0f8cfd7ccca5b8da949564bde63d8618c5", 0xf7}, {&(0x7f0000000780)="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", 0xfc}, {&(0x7f0000000880)="b034ff7cf012b8acacf131e9c4bbfd788eeebf55cc6b57567f834fc846f42f6bbc27bb07fcf579e498e5fc4dfe2ea1d1fe25901d200c8265094c4c0e84ab158ca8eebfaaaac2a915", 0x48}, {&(0x7f0000000900)="70ef4b7671482462fb373ccb814b5254eb74a5c370bcc488b0af05d550a0b65591a6dbec88807ec81788696678dd8863fa5d175550c7b8000351072800023f8ba9400f9522476c44a6cb54899a848c8b93796101cb521ac4035a8024e23302db0ed4dfdab9e71bca5065a31232d4e22ba8706879245261823a2677d8f1972e0f24dc49e1ce3ab9d61c2a9721dd5ff486a88436b9794e63c64873a84a2471812b384bf413dcbafafaacd638ddc64087", 0xaf}, {&(0x7f00000009c0)}], 0x6, &(0x7f0000000fc0)=[@rights={{0x1c, 0x1, 0x1, [r1, 0xffffffffffffffff, r3]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x1c}}], 0x118, 0x8000}}, {{&(0x7f0000001100)=@file={0x0, './mnt\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001180)="977c90c94473a0e6414792b998ed4e3dc45979f3f69373a2c4b08886110357d2fd4d2ceff7d2b8b8cdd1d551aef50c883fc86208167733168221a1b0c1b0e43004cadad0a1124eb5d7e80ee86d3861f76d55c8255c63d76b697a0af812089661bcceb881b010b221644826edd35a3ed68c5eb4c07699209aacd74507dc03739ff6db5b5a7d754d291d0439f08489e83ddf5b7da6ea4f603b51f61c001739f5b0efb92cda0706caaf477146c868c18c0bb38291", 0xb3}, {&(0x7f0000001240)="828d002174b96c456e396041b01226348f28ab3df1c73db9c225eb609d03e15ef85cf1c502ede4d2682556", 0x2b}, {&(0x7f0000001280)="0358bf15f35e5ee774ae15f48f7ba0fde0fb473808119d926e6f7140af3f1454f27f76d46e6738f749eff343c86d761dcda1ef20614b6ccf931432b0dbf542057397662f2db414f4854d214207a080f81cc12823cacaa23cf1b79547f37a3460d7c4a70aa3912c2752b3287f87933467a660a68731c4728d391c1b018debb842d211c506ffae8f691d04fef3bf8b551de4239078303b0d272db1acd9fd5c1b31ba62", 0xa2}, {&(0x7f0000001340)="89cc8e849a87ff7ff6273a27106704b21936f5c56fcf35d606bdc6900c3ddbd863824dae8c393d183d156da06810b41783720c8617c62969f91fff118d4ff82fdcb274c5906d0c2653df23c80e9ed618f526961693a7631b7c86aa3cce832ebf3256646f0cc5fcb43de7b4c4d827a44844c3e52da9489d62b9ce3446f6686be7d4f91b1ba0450d285f11f439efd5784543a3bd9dc898bfeb4b11f52af5d5f46ac3320bc6aa2df12734b0b2a39b36cd83d1febdd1185cd69e7514961c78955ecc1ea8797d5c03320c071a6512a82990dca8f8de21cf67c0fb175d78db4746e8cfc47e0b7b8759e05b07dfaf", 0xeb}], 0x4, &(0x7f0000001940)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r1, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r4, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r2, @ANYRES32=r7, @ANYRES32, @ANYRES32=r8, @ANYBLOB="34000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r1, @ANYRES32, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r9, @ANYRES32=r10, @ANYRES32=r2, @ANYRES32=r1, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=r12, @ANYRES32, @ANYBLOB="0000000014000000000000000100000001000000865aec653f73e71c35c04641d2ae4b1191d18bfd68d6dbd92016b4b1c30650621984de668a1e029d6f59997fed015a6f69f68d3669578ba9179418035db444160acd84f8e577614fd11a3c3cf0c2", @ANYRES32=r14, @ANYBLOB='\x00\x00\x00\x00'], 0xd8, 0x4000000}}], 0x2, 0x4810) write(r3, &(0x7f0000000740)='foo', 0x3) 12:45:15 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") signalfd(r0, &(0x7f0000000000)={[0x2]}, 0x8) r1 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r3, &(0x7f0000000740)='foo', 0x3) 12:45:15 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") signalfd(r0, &(0x7f0000000000)={[0x2]}, 0x8) r1 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async, rerun: 64) r2 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) (rerun: 64) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) r3 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r3, &(0x7f0000000740)='foo', 0x3) 12:45:15 executing program 2: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@ipv6_newnexthop={0x38, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_ENCAP_TYPE={0x6, 0x7, 0x6}, @NHA_ENCAP={0x10, 0x8, 0x0, 0x1, @LWTUNNEL_IP_ID={0xc}}, @NHA_OIF={0x8, 0x5, r1}]}, 0x38}}, 0x0) 12:45:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=@newlink={0x38, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}, @IFLA_GSO_MAX_SEGS={0x8}, @IFLA_GSO_MAX_SIZE={0x8}]}, 0x38}}, 0x0) 12:45:21 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x5) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=ANY=[@ANYBLOB="3c0000002800666f82270d000000f7ffffffffffffff00", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000b000100666c6f7765720000040002000600050000090000"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000440)={&(0x7f0000000900)=ANY=[@ANYBLOB="800100006d00200026bd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x180}, 0x1, 0x0, 0x0, 0x40081}, 0x4000800) connect$can_bcm(r2, &(0x7f0000000000), 0x10) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000880), 0x222800) ioctl$FIBMAP(r3, 0x1, &(0x7f00000008c0)=0x1f) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3b0a08bd17"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$can_bcm(r2, &(0x7f00000003c0)={&(0x7f0000000280)={0x1d, r1}, 0x10, &(0x7f0000000300)={&(0x7f0000001a40)=ANY=[@ANYBLOB="02000000200000000100000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="000000a0010000000200008000000448156a396d2009612106d10378dc6cc0f15b7a6651f6dac41d04d85fdacb265114addf13a7a7710db2bb4a2fffffffff3ac90bdcc30d7091b072b259db8f2ba447edbfcc88f1c2ea31d10f4f7468d8b4071f4645c2c5c32e2b17e75daf539a3ae838d93000da567783f866619ff6370b842fd6e04aa0582ecf5e3e7812e771f8610100000001000000a495a97db7fec8b0"], 0x80}, 0x1, 0x0, 0x0, 0x4004000}, 0x40) r4 = creat(&(0x7f0000000200)='./bus\x00', 0x200) r5 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x39}}}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001b40)={{r6, 0x2, 0x0, 0x0, 0x7fd, 0xfffffffffffffffa, 0x2, 0x5, 0x80000000, 0x0, 0x96e, 0x2, 0x3, 0x8, 0x6}}) ftruncate(r4, 0x800) lseek(r4, 0x200, 0x0) r7 = socket(0x2, 0x2, 0x1) r8 = socket(0x10, 0x803, 0x0) getsockname$packet(r8, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=ANY=[@ANYBLOB="4000000010003904000000008000000000000000", @ANYRES32=0x0, @ANYBLOB="01980000000000002000128008000100677265001400028008000100", @ANYRES32=r9, @ANYBLOB="08000700ac1e0001"], 0x40}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r10, 0x81f8943c, &(0x7f00000017c0)) sendto$packet(0xffffffffffffffff, &(0x7f0000000b00)='*\x00\x00\x00\x00\x00\x00\x00', 0x8, 0x0, &(0x7f0000000000)={0x3, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ccfb7708ffca"}, 0x2) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r7, 0x80047210, &(0x7f0000000400)) r11 = open(&(0x7f0000000000)='./bus\x00', 0x66140, 0x0) sendfile(r4, r11, 0x0, 0xee00) 12:45:21 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") signalfd(r0, &(0x7f0000000000)={[0x2]}, 0x8) r1 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) (async) r2 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r3, &(0x7f0000000740)='foo', 0x3) 12:45:21 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f0000000080)={0x0, 0x33, &(0x7f0000000100)=[{&(0x7f0000000000)="2c1004000300072a", 0x584}], 0x1, 0x0, 0x0, 0x3a}, 0x3b000c00) 12:45:21 executing program 0: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, &(0x7f0000001640)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @local}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f00000000c0)=[@rthdr_2292={{0x24, 0x29, 0x3e}}], 0x18}}], 0x2, 0x0) 12:45:21 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x5) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=ANY=[@ANYBLOB="3c0000002800666f82270d000000f7ffffffffffffff00", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000b000100666c6f7765720000040002000600050000090000"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000440)={&(0x7f0000000900)=ANY=[@ANYBLOB="800100006d00200026bd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x180}, 0x1, 0x0, 0x0, 0x40081}, 0x4000800) connect$can_bcm(r2, &(0x7f0000000000), 0x10) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000880), 0x222800) ioctl$FIBMAP(r3, 0x1, &(0x7f00000008c0)=0x1f) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3b0a08bd17"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$can_bcm(r2, &(0x7f00000003c0)={&(0x7f0000000280)={0x1d, r1}, 0x10, &(0x7f0000000300)={&(0x7f0000001a40)=ANY=[@ANYBLOB="02000000200000000100000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="000000a0010000000200008000000448156a396d2009612106d10378dc6cc0f15b7a6651f6dac41d04d85fdacb265114addf13a7a7710db2bb4a2fffffffff3ac90bdcc30d7091b072b259db8f2ba447edbfcc88f1c2ea31d10f4f7468d8b4071f4645c2c5c32e2b17e75daf539a3ae838d93000da567783f866619ff6370b842fd6e04aa0582ecf5e3e7812e771f8610100000001000000a495a97db7fec8b0"], 0x80}, 0x1, 0x0, 0x0, 0x4004000}, 0x40) r4 = creat(&(0x7f0000000200)='./bus\x00', 0x200) r5 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x39}}}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001b40)={{r6, 0x2, 0x0, 0x0, 0x7fd, 0xfffffffffffffffa, 0x2, 0x5, 0x80000000, 0x0, 0x96e, 0x2, 0x3, 0x8, 0x6}}) ftruncate(r4, 0x800) lseek(r4, 0x200, 0x0) r7 = socket(0x2, 0x2, 0x1) r8 = socket(0x10, 0x803, 0x0) getsockname$packet(r8, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=ANY=[@ANYBLOB="4000000010003904000000008000000000000000", @ANYRES32=0x0, @ANYBLOB="01980000000000002000128008000100677265001400028008000100", @ANYRES32=r9, @ANYBLOB="08000700ac1e0001"], 0x40}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r10, 0x81f8943c, &(0x7f00000017c0)) sendto$packet(0xffffffffffffffff, &(0x7f0000000b00)='*\x00\x00\x00\x00\x00\x00\x00', 0x8, 0x0, &(0x7f0000000000)={0x3, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ccfb7708ffca"}, 0x2) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r7, 0x80047210, &(0x7f0000000400)) r11 = open(&(0x7f0000000000)='./bus\x00', 0x66140, 0x0) sendfile(r4, r11, 0x0, 0xee00) 12:45:21 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000020000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$sock_int(r0, 0x1, 0x20, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r3 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r3, @ANYRESDEC, @ANYRESHEX=r3], 0x1, 0x522, &(0x7f0000000a80)="$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") stat(0x0, 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f00000009c0), 0x6000) ftruncate(0xffffffffffffffff, 0x800) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000980)='./file0/../file0\x00', &(0x7f0000000fc0), 0x100) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) r5 = dup(r4) write$UHID_INPUT(r5, &(0x7f0000001040)={0x18, {"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", 0x1000}}, 0x1006) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002400)={{{@in6=@empty, @in=@multicast2}}, {{@in=@initdev}, 0x0, @in6=@private2}}, &(0x7f0000005f40)=0xe8) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1, &(0x7f00000000c0)=[@cred={{0x1c}}], 0x20, 0x24008000}}, {{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000540)="79b3b4462d7af6c3ce1b6a31c13819936c8b29c4a9ca9a606f45df326725a96898b6436ce5d4d625cb1d86e506f7a8bfef758ce3d20cc5cfa4b3ef73dffc055d296217d89943bd01f5d1b2a990b4bff4f0e83ee273fc012a14bbd32587c70e96d09cad8a1a17b13b0e9962f88bd135", 0x6f}, {&(0x7f0000000640)}, {&(0x7f0000001300)}, {0x0}], 0x4, &(0x7f0000000280)=[@cred={{0x1c}}], 0x20, 0x40001}}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000002b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000003c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000000400)=[0x0, 0x0], &(0x7f0000000440)=[0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}], 0x10, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000007c0)=@can_newroute={0x1c, 0x18, 0x100, 0x70bd26, 0x25dfdbfe, {0x1d, 0x1, 0x7}, [@CGW_DST_IF={0x8, 0xa, r6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000002540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 12:45:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/cpuset.cpus\x00', 0x0, 0x0) io_setup(0x2d2, &(0x7f0000000980)=0x0) r2 = socket$qrtr(0x2a, 0x2, 0x0) dup2(r2, r0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000480)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000080)="f0", 0x3fffff}]) 12:45:21 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f0000000080)={0x0, 0x33, &(0x7f0000000100)=[{&(0x7f0000000000)="2c1004000300072a", 0x584}], 0x1, 0x0, 0x0, 0x3a}, 0x3b000c00) 12:45:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000000)=ANY=[@ANYBLOB="02000000000000000000000000000000e3ffffffffffffff0000000000000000000000000000000040ffff004307fd6ae02f95f5fbabc52fc77595da5297a2f48584934a2eca5c06fd4ef32088f11e5e22a5ccc5ad3ba79189eea9338938d0b017ae14e2fe99d086df3d7f614f514bedf9b17f7d6b94db4efac0065e67a75ca6548b467060499c8accb3e481848d0187ffe6908a857830aa5a2fab986002afe1362c999f551fed17dcfd6d4c75ca34214fe9f7e43d5599343f1c07ef60eebcab650da441c7f3357a4a71ca315e7687b805b0f1c5e0d13c3cbaa8d21705b799", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f40"]) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='mnt/encrypted_dir/file\x00', r0}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180), 0x64002, 0x0) open$dir(&(0x7f0000000580)='mnt\x00', 0x400400, 0x8) 12:45:21 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f0000000080)={0x0, 0x33, &(0x7f0000000100)=[{&(0x7f0000000000)="2c1004000300072a", 0x584}], 0x1, 0x0, 0x0, 0x3a}, 0x3b000c00) 12:45:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000000)=ANY=[@ANYBLOB="02000000000000000000000000000000e3ffffffffffffff0000000000000000000000000000000040ffff004307fd6ae02f95f5fbabc52fc77595da5297a2f48584934a2eca5c06fd4ef32088f11e5e22a5ccc5ad3ba79189eea9338938d0b017ae14e2fe99d086df3d7f614f514bedf9b17f7d6b94db4efac0065e67a75ca6548b467060499c8accb3e481848d0187ffe6908a857830aa5a2fab986002afe1362c999f551fed17dcfd6d4c75ca34214fe9f7e43d5599343f1c07ef60eebcab650da441c7f3357a4a71ca315e7687b805b0f1c5e0d13c3cbaa8d21705b799", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f40"]) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='mnt/encrypted_dir/file\x00', r0}, 0x10) (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180), 0x64002, 0x0) (async) open$dir(&(0x7f0000000580)='mnt\x00', 0x400400, 0x8) 12:45:25 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001280)={0x18, 0x3, &(0x7f0000001940)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000400)='jbd2_checkpoint_stats\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.throttle.io_service_bytes_recursive\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086607, &(0x7f0000000040)) 12:45:25 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f0000000080)={0x0, 0x33, &(0x7f0000000100)=[{&(0x7f0000000000)="2c1004000300072a", 0x584}], 0x1, 0x0, 0x0, 0x3a}, 0x3b000c00) 12:45:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) (async) r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000000)=ANY=[@ANYBLOB="02000000000000000000000000000000e3ffffffffffffff0000000000000000000000000000000040ffff004307fd6ae02f95f5fbabc52fc77595da5297a2f48584934a2eca5c06fd4ef32088f11e5e22a5ccc5ad3ba79189eea9338938d0b017ae14e2fe99d086df3d7f614f514bedf9b17f7d6b94db4efac0065e67a75ca6548b467060499c8accb3e481848d0187ffe6908a857830aa5a2fab986002afe1362c999f551fed17dcfd6d4c75ca34214fe9f7e43d5599343f1c07ef60eebcab650da441c7f3357a4a71ca315e7687b805b0f1c5e0d13c3cbaa8d21705b799", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f40"]) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='mnt/encrypted_dir/file\x00', r0}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180), 0x64002, 0x0) open$dir(&(0x7f0000000580)='mnt\x00', 0x400400, 0x8) 12:45:25 executing program 2: r0 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80004ad2}, 0x10) write(r0, &(0x7f00000001c0)="9e00000052001f0114f9f407112c04091c0007ed8a0001000a00000009000000000000009aad6cfdd24ab2511ff6d48fce8abb5d96064e71b3b90026202a53fe89045855e7e072070a191b827e47dd79b47ca7a1e1bd5824175310ed4102ceb2c7fb049214eff7bb5b169f124f0bfc2311e398b0ba5d8d218c000d8d8b03279a129aabb333b297e922bb5960dd03311229e1e37914f7a158904a3da1b7c5", 0x9e) 12:45:25 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$can_j1939(0x1d, 0x2, 0x7) connect$can_j1939(r0, &(0x7f0000000080), 0x2) 12:45:25 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg\x00', 0x6}) ioctl$TUNSETOFFLOAD(r0, 0x400454c8, 0x0) 12:45:25 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000023000000850000000700000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_exit\x00', r1}, 0x10) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ftruncate(r0, 0x0) 12:45:25 executing program 4: syz_open_procfs(0x0, &(0x7f0000000040)='schedstat\x00') prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getrlimit(0xa, &(0x7f0000000000)) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) gettid() capget(&(0x7f0000000f00)={0x20071026}, &(0x7f0000000f40)={0x20001, 0x5d, 0x9, 0x10000, 0x3ff, 0x6}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r0, 0x8, &(0x7f00000003c0)=0xaa) socket$tipc(0x1e, 0x0, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) r4 = signalfd4(r3, &(0x7f0000000f80)={[0x7cb]}, 0x8, 0x800) bind$unix(r4, &(0x7f0000000fc0)=@abs={0x1, 0x0, 0x4e21}, 0x6e) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xffffffffffffffff, r5, 0x0) sendmmsg$unix(r1, &(0x7f0000000980), 0x400000000000120, 0x4008000) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000c40)='/proc/tty/ldiscs\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x20000023896) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x2, {{0x42, 0x4}, 0x3}}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000480)="35d02ffde324f2876dc258fe2fd09aea54d784c417acbfea424a6c93f8dd62e49dfd41f4ef2f48acbfc34121852852e28481130e18d96871a0c9e7e74dbb19cd82281fcf6adedf91b6d7c099fe866636b7d83e3471894a4c738b742a732ee9ccdcdc3ae09ae72ec128d54b3677a5433ea6dec81b769cbddb59b89eb28f36086056e09dca9be14b5b3ab694a11dd9d6bedbc62579b704b8e0030c2d751da90e619c71a51976b3f04e244841e5f868e3c2f471ef81ee048f59b447d31d021707743ab71638aa420bbc34d446cf2901b927858315790162d6e1b1f04e111e", 0xdd}, {&(0x7f00000009c0)="7fd82a1b80e5a0d7654f2bd615e1451126643ad972e4107906c4506cffadf79f2ea02eab1d54ee3ae742484a2b9d85983ad7cf2e66b43d35224147d6a61cdaa4ec0bc9d8194ee7266e4f4e68eab0e5e4299e4c227202d3ab92ad18f6fa71f2d83411e4b9a92e37", 0x67}, {&(0x7f0000000a40)="e6c3b42f18da39dc02c4c20907ad2a6685f6827bab1564f4509790a95ed012b2f6b1f7fedb7282a637a418803b0f82adcc61de64ea0ca26e1a0098aa79ba65bdce4524cc07df899f5a62800d4b0cc4d0292e602f84fcaae4001b1083055ca10901dd4dc1bcfc4173", 0x68}, {&(0x7f0000000ac0)="4120acfd28f472f7c3f929e13aef331ad5ab73c907565c01ade3286e26e179bcb8e5ee5bfa3817f98cd3889de7753a79e38364a94003676c7275bd700a137700f1909007fae0970c462b9de3e3", 0x4d}], 0x4, &(0x7f0000000b40)="8f0fdc5cc4eab3ebc9c93a9c6df81b945d9c7cf3ab08bbdd0c134f9580f908974ab845544eaf6d52134060fd34e0c93f75e0e3f18063de3cb2c3dee25b13adfd7ecdd096475ca31d338a2faf1a668dd6b1b5a22543efc7420d4daa68dae6e9b591756f8265b5c61c65ffede8b867444f93a11b7e45ef8f59e2796fc39b26d4612cfbd2c3ce528a30466f8eb67d32da011b1a844da51c003e998a08a96fc440609f01", 0xa2, 0x10090}, 0x4000004) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup/syz0\x00', 0x1ff) ptrace$peeksig(0x4209, 0x0, &(0x7f0000000240)={0x1fe, 0x0, 0x2}, &(0x7f0000000740)=[{}, {}]) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000680)) waitid(0xf04cb06e96ae95f3, 0x0, &(0x7f0000000400), 0x80000000, &(0x7f0000000580)) 12:45:25 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="a9d9b4e47cffbaeb8178f1276d9a4c572a87eccebab83de92eea319bfe33296545ab72bd366b3f38f5c4640400000000000000570f2f39b6eba0abc611a7055736ca96cb7bc25604ce439793ce4f0000000000000000000003810000"], 0x0, 0x236, &(0x7f0000000300)="$eJzs3TFoM2UcBvDnLomf/b4gVRdBUEFEtFDqJrjURaEgpYgIKlREXJRWqC1urZOLg84qnVyKuFkdpUtxUQSnqh3qImhxsDjoELlcK9VGFFNz8t3vB5fcJe97//e4e95kOS5Aa00nmU/SSTKTpJekON/grnqZPt3cntpfTgaDx38shu3q7dpZv2tJtpI8mGSvLPJiN9nYffro54NH731jvXfPe7tPTU30IE8dHx0+dvLu4usfLjyw8fmX3y8WmU//D8d1+YoRn3WL5Jb/otj/RNFtegT8E0uvfvBVlftbk9w9zH8vZeqT9+baDXu93P/OX/V964cvbp/kWIHLNxj0qt/ArQHQOmWSfopyNkm9Xpazs/V/+K87V8uXVtdemXlhdX3l+aZnKuCy9JPDRz6+8tG1P+X/u06df+D6VeX/iaWdb6r1k07TowEmqcr/zLOb90X+oXXkH9pL/qG95B/aS/6hveQf2kv+ob3kH9pL/qG95B/a63z+AYB2GVxp+g5koClNzz8AAAAAAAAAAAAAAAAAAMBF21P7y2fLpGp++nZy/HCS7qj6neHziJMbh69XfyqqZr8r6m5jeebOMXcwpvcbvvv6pm+brf/ZHc3W31xJtl5LMtftXrz+itPr79+7+W++7z03ZoExPfRks/V/3Wm2/sJB8kk1/8yNmn/K3DZ8Hz3/9KvzN2b9l38ZcwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABMzG8BAAD//8n0bSk=") r1 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r3 = socket(0x10, 0x3, 0x0) bind$netlink(r3, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64fbec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) openat$cgroup_ro(r1, &(0x7f00000002c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) write(r0, &(0x7f0000000780)="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", 0x105) connect$netlink(r3, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r3, &(0x7f0000000000)='\"', 0x1) recvmmsg(r3, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) sendmsg$NFT_MSG_GETOBJ(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c000000130a0104000000064000000000000000020c0006400000000000000002"], 0x2c}, 0x1, 0x0, 0x0, 0x4000c080}, 0x40000) recvmmsg(r3, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) ptrace$setopts(0x4200, r5, 0x0, 0x80000) fcntl$lock(r3, 0x26, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x0, r5}) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x40, 0x0, 0x20, 0x70bd65, 0x25dfdbff, {{}, {@void, @val={0x8}, @val={0xc, 0x99, {0x6, 0x2c}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r5}, @NL80211_ATTR_NETNS_FD={0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x810}, 0x4000) sched_setscheduler(r5, 0x0, &(0x7f0000000080)=0x5) r6 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r6, &(0x7f0000000740)='foo', 0x3) 12:45:25 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0xa, 0x77, 0x5, 0x6}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000800), &(0x7f0000000200)=""/230, 0x2}, 0x20) 12:45:25 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xc, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0xce) sched_setscheduler(r0, 0x0, &(0x7f0000000280)) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002140)={&(0x7f00000003c0)=@proc={0x10, 0x0, 0x25dfdbfe, 0x20}, 0xc, &(0x7f0000000400)=[{&(0x7f0000002680)={0xb8, 0x22, 0x400, 0x70bd2b, 0x25dfdbfe, "", [@generic="fe9c51289400b4f0414274e43d057532afd413e4a4", @nested={0x86, 0x0, 0x0, 0x1, [@generic="0925888e7953e310a332559297484be99642e8c57f9a1c9a9407b5c0a49a267b535915fae9f221737016cc967e430a0031aece276593d15e1047ef187c7b433057ae07316a7c882c5352516bb6187834c78829d2f924f153595027cb9b5b8714a9d6", @typed={0x8, 0x5a, 0x0, 0x0, @pid}, @typed={0x8, 0x2c, 0x0, 0x0, @pid}, @typed={0x8, 0x31, 0x0, 0x0, @pid}, @typed={0x8, 0x1b, 0x0, 0x0, @pid=r0}]}, @typed={0x8, 0x52, 0x0, 0x0, @ipv4=@rand_addr=0x64010100}]}, 0xb8}, {&(0x7f0000002840)=ANY=[], 0x5b0}], 0x2, 0x0, 0x0, 0x40000}, 0x40050) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x522, &(0x7f0000000a80)="$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") getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f000000c140), 0x0) close_range(r2, 0xffffffffffffffff, 0x0) 12:45:25 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x4, 0x8, 0x2}, 0x48) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r0, &(0x7f00000004c0), &(0x7f0000000180)=@tcp6=r1}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r0, &(0x7f0000000580), 0x0}, 0x20) 12:45:25 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x2e240915) r1 = request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000380)='\x00', r0) keyctl$get_security(0x11, r1, &(0x7f00000003c0)=""/160, 0xa0) r2 = add_key(&(0x7f0000000180)='.dead\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$link(0x8, 0x0, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x804c1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5acf399e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) removexattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000740)=ANY=[@ANYBLOB="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"]) r4 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r6 = socket$can_bcm(0x1d, 0x2, 0x2) r7 = add_key(&(0x7f00000004c0)='.request_key_auth\x00', &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000000540)="abc9f0773d4db62f0b58eac993ed3858bc43e3a717d61c0e2e9bc0da72c6e4a2230d90ebb95d2bc3093ad6cb04c5c601c2099a020b17cf695c21044efa10387a25f48a0306d1ba85bb58cad66a1d648c6859e9c9375c9d67925eba3f5edf03c73833f9d9c08317d3c27db11ce26f75d9d21aed05921c11853a8a6537c10538575042ce149aff22339a2739434a658e8f92535eadb4e3c18836f28e0e28e83380113a1ff37267a743fea8df8ce21a43ef44793eb26b02fe394bbd61bc46a62e48040fffbf74d55656009e7ad9e3c568b61299f64c384cc3714557abbfe2a8433098df", 0xe2, r1) keyctl$link(0x8, r7, r0) r8 = add_key$fscrypt_provisioning(&(0x7f0000000680), &(0x7f00000006c0)={'syz', 0x3}, &(0x7f0000000a40)=ANY=[@ANYBLOB="b4273f33000000006161616161616161616161616161616161616161616161616161616161397f917c61616131313131313131313131313131313131313131313131313131313131313131"], 0x48, r2) keyctl$read(0xb, r8, 0x0, 0x0) connect$can_bcm(r6, &(0x7f0000000000), 0x10) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r3, 0x9) sendmsg$can_bcm(r6, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r5, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="01000000d7fe63dfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r4, @ANYBLOB="4ebb440701"], 0x20000600}}, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000000c0)=0x1000) r9 = socket$inet6(0xa, 0x400000000001, 0x0) r10 = open(&(0x7f0000000300)='./bus\x00', 0x143042, 0x0) ftruncate(r10, 0x2006fff) add_key$keyring(&(0x7f0000000940), &(0x7f0000000900)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)=ANY=[], 0x17c}}, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r4) close(r9) open(&(0x7f00000002c0)='./bus\x00', 0x145842, 0x158) sendfile(r9, r9, 0x0, 0x205000) 12:45:25 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) timer_create(0x0, 0x0, 0x0) ioctl$AUTOFS_IOC_SETTIMEOUT(r0, 0x541b, 0x0) [ 2859.948130][ T2461] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2579 sclass=netlink_route_socket pid=2461 comm=syz-executor.5 [ 2859.981809][ T25] audit: type=1326 audit(1682858725.798:1157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2471 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fc8b04c2169 code=0x0 12:45:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="a9d9b4e47cffbaeb8178f1276d9a4c572a87eccebab83de92eea319bfe33296545ab72bd366b3f38f5c4640400000000000000570f2f39b6eba0abc611a7055736ca96cb7bc25604ce439793ce4f0000000000000000000003810000"], 0x0, 0x236, &(0x7f0000000300)="$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") (async) r0 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="a9d9b4e47cffbaeb8178f1276d9a4c572a87eccebab83de92eea319bfe33296545ab72bd366b3f38f5c4640400000000000000570f2f39b6eba0abc611a7055736ca96cb7bc25604ce439793ce4f0000000000000000000003810000"], 0x0, 0x236, &(0x7f0000000300)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r3 = socket(0x10, 0x3, 0x0) bind$netlink(r3, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64fbec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) openat$cgroup_ro(r1, &(0x7f00000002c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) write(r0, &(0x7f0000000780)="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", 0x105) connect$netlink(r3, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) (async) connect$netlink(r3, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) (async) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r3, &(0x7f0000000000)='\"', 0x1) recvmmsg(r3, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) (async) recvmmsg(r3, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) sendmsg$NFT_MSG_GETOBJ(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c000000130a0104000000064000000000000000020c0006400000000000000002"], 0x2c}, 0x1, 0x0, 0x0, 0x4000c080}, 0x40000) recvmmsg(r3, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) ptrace$setopts(0x4200, r5, 0x0, 0x80000) fcntl$lock(r3, 0x26, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x0, r5}) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x40, 0x0, 0x20, 0x70bd65, 0x25dfdbff, {{}, {@void, @val={0x8}, @val={0xc, 0x99, {0x6, 0x2c}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r5}, @NL80211_ATTR_NETNS_FD={0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x810}, 0x4000) (async) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x40, 0x0, 0x20, 0x70bd65, 0x25dfdbff, {{}, {@void, @val={0x8}, @val={0xc, 0x99, {0x6, 0x2c}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r5}, @NL80211_ATTR_NETNS_FD={0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x810}, 0x4000) sched_setscheduler(r5, 0x0, &(0x7f0000000080)=0x5) (async) sched_setscheduler(r5, 0x0, &(0x7f0000000080)=0x5) r6 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r6, &(0x7f0000000740)='foo', 0x3) (async) write(r6, &(0x7f0000000740)='foo', 0x3) 12:45:26 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000001f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f00000001c0)=0x6, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) 12:45:26 executing program 4: syz_open_procfs(0x0, &(0x7f0000000040)='schedstat\x00') prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getrlimit(0xa, &(0x7f0000000000)) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) gettid() capget(&(0x7f0000000f00)={0x20071026}, &(0x7f0000000f40)={0x20001, 0x5d, 0x9, 0x10000, 0x3ff, 0x6}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r0, 0x8, &(0x7f00000003c0)=0xaa) socket$tipc(0x1e, 0x0, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) r4 = signalfd4(r3, &(0x7f0000000f80)={[0x7cb]}, 0x8, 0x800) bind$unix(r4, &(0x7f0000000fc0)=@abs={0x1, 0x0, 0x4e21}, 0x6e) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xffffffffffffffff, r5, 0x0) sendmmsg$unix(r1, &(0x7f0000000980), 0x400000000000120, 0x4008000) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000c40)='/proc/tty/ldiscs\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x20000023896) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x2, {{0x42, 0x4}, 0x3}}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000480)="35d02ffde324f2876dc258fe2fd09aea54d784c417acbfea424a6c93f8dd62e49dfd41f4ef2f48acbfc34121852852e28481130e18d96871a0c9e7e74dbb19cd82281fcf6adedf91b6d7c099fe866636b7d83e3471894a4c738b742a732ee9ccdcdc3ae09ae72ec128d54b3677a5433ea6dec81b769cbddb59b89eb28f36086056e09dca9be14b5b3ab694a11dd9d6bedbc62579b704b8e0030c2d751da90e619c71a51976b3f04e244841e5f868e3c2f471ef81ee048f59b447d31d021707743ab71638aa420bbc34d446cf2901b927858315790162d6e1b1f04e111e", 0xdd}, {&(0x7f00000009c0)="7fd82a1b80e5a0d7654f2bd615e1451126643ad972e4107906c4506cffadf79f2ea02eab1d54ee3ae742484a2b9d85983ad7cf2e66b43d35224147d6a61cdaa4ec0bc9d8194ee7266e4f4e68eab0e5e4299e4c227202d3ab92ad18f6fa71f2d83411e4b9a92e37", 0x67}, {&(0x7f0000000a40)="e6c3b42f18da39dc02c4c20907ad2a6685f6827bab1564f4509790a95ed012b2f6b1f7fedb7282a637a418803b0f82adcc61de64ea0ca26e1a0098aa79ba65bdce4524cc07df899f5a62800d4b0cc4d0292e602f84fcaae4001b1083055ca10901dd4dc1bcfc4173", 0x68}, {&(0x7f0000000ac0)="4120acfd28f472f7c3f929e13aef331ad5ab73c907565c01ade3286e26e179bcb8e5ee5bfa3817f98cd3889de7753a79e38364a94003676c7275bd700a137700f1909007fae0970c462b9de3e3", 0x4d}], 0x4, &(0x7f0000000b40)="8f0fdc5cc4eab3ebc9c93a9c6df81b945d9c7cf3ab08bbdd0c134f9580f908974ab845544eaf6d52134060fd34e0c93f75e0e3f18063de3cb2c3dee25b13adfd7ecdd096475ca31d338a2faf1a668dd6b1b5a22543efc7420d4daa68dae6e9b591756f8265b5c61c65ffede8b867444f93a11b7e45ef8f59e2796fc39b26d4612cfbd2c3ce528a30466f8eb67d32da011b1a844da51c003e998a08a96fc440609f01", 0xa2, 0x10090}, 0x4000004) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup/syz0\x00', 0x1ff) ptrace$peeksig(0x4209, 0x0, &(0x7f0000000240)={0x1fe, 0x0, 0x2}, &(0x7f0000000740)=[{}, {}]) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000680)) waitid(0xf04cb06e96ae95f3, 0x0, &(0x7f0000000400), 0x80000000, &(0x7f0000000580)) [ 2860.807200][ T2484] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2579 sclass=netlink_route_socket pid=2484 comm=syz-executor.5 12:45:30 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg\x00', 0x6}) ioctl$TUNSETOFFLOAD(r0, 0x400454c8, 0x0) 12:45:30 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000004000000000000000000850000006d00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='mmap_lock_acquire_returned\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x10012, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) 12:45:30 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x2e240915) r1 = request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000380)='\x00', r0) keyctl$get_security(0x11, r1, &(0x7f00000003c0)=""/160, 0xa0) r2 = add_key(&(0x7f0000000180)='.dead\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$link(0x8, 0x0, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x804c1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5acf399e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) removexattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000740)=ANY=[@ANYBLOB="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"]) r4 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r6 = socket$can_bcm(0x1d, 0x2, 0x2) r7 = add_key(&(0x7f00000004c0)='.request_key_auth\x00', &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000000540)="abc9f0773d4db62f0b58eac993ed3858bc43e3a717d61c0e2e9bc0da72c6e4a2230d90ebb95d2bc3093ad6cb04c5c601c2099a020b17cf695c21044efa10387a25f48a0306d1ba85bb58cad66a1d648c6859e9c9375c9d67925eba3f5edf03c73833f9d9c08317d3c27db11ce26f75d9d21aed05921c11853a8a6537c10538575042ce149aff22339a2739434a658e8f92535eadb4e3c18836f28e0e28e83380113a1ff37267a743fea8df8ce21a43ef44793eb26b02fe394bbd61bc46a62e48040fffbf74d55656009e7ad9e3c568b61299f64c384cc3714557abbfe2a8433098df", 0xe2, r1) keyctl$link(0x8, r7, r0) r8 = add_key$fscrypt_provisioning(&(0x7f0000000680), &(0x7f00000006c0)={'syz', 0x3}, &(0x7f0000000a40)=ANY=[@ANYBLOB="b4273f33000000006161616161616161616161616161616161616161616161616161616161397f917c61616131313131313131313131313131313131313131313131313131313131313131"], 0x48, r2) keyctl$read(0xb, r8, 0x0, 0x0) connect$can_bcm(r6, &(0x7f0000000000), 0x10) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r3, 0x9) sendmsg$can_bcm(r6, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r5, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="01000000d7fe63dfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r4, @ANYBLOB="4ebb440701"], 0x20000600}}, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000000c0)=0x1000) r9 = socket$inet6(0xa, 0x400000000001, 0x0) r10 = open(&(0x7f0000000300)='./bus\x00', 0x143042, 0x0) ftruncate(r10, 0x2006fff) add_key$keyring(&(0x7f0000000940), &(0x7f0000000900)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)=ANY=[], 0x17c}}, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r4) close(r9) open(&(0x7f00000002c0)='./bus\x00', 0x145842, 0x158) sendfile(r9, r9, 0x0, 0x205000) 12:45:30 executing program 0: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000080)='\r', 0x1}], 0x1, 0x0, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) fallocate(r0, 0x0, 0x0, 0x6) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x8, 0x2000, 0x10000) 12:45:30 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="a9d9b4e47cffbaeb8178f1276d9a4c572a87eccebab83de92eea319bfe33296545ab72bd366b3f38f5c4640400000000000000570f2f39b6eba0abc611a7055736ca96cb7bc25604ce439793ce4f0000000000000000000003810000"], 0x0, 0x236, &(0x7f0000000300)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) r3 = socket(0x10, 0x3, 0x0) bind$netlink(r3, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) (async) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64fbec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) (async) openat$cgroup_ro(r1, &(0x7f00000002c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) write(r0, &(0x7f0000000780)="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", 0x105) (async) connect$netlink(r3, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) (async) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) (async) write(r3, &(0x7f0000000000)='\"', 0x1) (async) recvmmsg(r3, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) sendmsg$NFT_MSG_GETOBJ(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c000000130a0104000000064000000000000000020c0006400000000000000002"], 0x2c}, 0x1, 0x0, 0x0, 0x4000c080}, 0x40000) recvmmsg(r3, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) (async) ptrace$setopts(0x4200, r5, 0x0, 0x80000) (async) fcntl$lock(r3, 0x26, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x0, r5}) (async) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x40, 0x0, 0x20, 0x70bd65, 0x25dfdbff, {{}, {@void, @val={0x8}, @val={0xc, 0x99, {0x6, 0x2c}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r5}, @NL80211_ATTR_NETNS_FD={0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x810}, 0x4000) (async) sched_setscheduler(r5, 0x0, &(0x7f0000000080)=0x5) (async) r6 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r6, &(0x7f0000000740)='foo', 0x3) 12:45:30 executing program 4: syz_open_procfs(0x0, &(0x7f0000000040)='schedstat\x00') prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getrlimit(0xa, &(0x7f0000000000)) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) gettid() capget(&(0x7f0000000f00)={0x20071026}, &(0x7f0000000f40)={0x20001, 0x5d, 0x9, 0x10000, 0x3ff, 0x6}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r0, 0x8, &(0x7f00000003c0)=0xaa) socket$tipc(0x1e, 0x0, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) r4 = signalfd4(r3, &(0x7f0000000f80)={[0x7cb]}, 0x8, 0x800) bind$unix(r4, &(0x7f0000000fc0)=@abs={0x1, 0x0, 0x4e21}, 0x6e) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xffffffffffffffff, r5, 0x0) sendmmsg$unix(r1, &(0x7f0000000980), 0x400000000000120, 0x4008000) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000c40)='/proc/tty/ldiscs\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x20000023896) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x2, {{0x42, 0x4}, 0x3}}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000480)="35d02ffde324f2876dc258fe2fd09aea54d784c417acbfea424a6c93f8dd62e49dfd41f4ef2f48acbfc34121852852e28481130e18d96871a0c9e7e74dbb19cd82281fcf6adedf91b6d7c099fe866636b7d83e3471894a4c738b742a732ee9ccdcdc3ae09ae72ec128d54b3677a5433ea6dec81b769cbddb59b89eb28f36086056e09dca9be14b5b3ab694a11dd9d6bedbc62579b704b8e0030c2d751da90e619c71a51976b3f04e244841e5f868e3c2f471ef81ee048f59b447d31d021707743ab71638aa420bbc34d446cf2901b927858315790162d6e1b1f04e111e", 0xdd}, {&(0x7f00000009c0)="7fd82a1b80e5a0d7654f2bd615e1451126643ad972e4107906c4506cffadf79f2ea02eab1d54ee3ae742484a2b9d85983ad7cf2e66b43d35224147d6a61cdaa4ec0bc9d8194ee7266e4f4e68eab0e5e4299e4c227202d3ab92ad18f6fa71f2d83411e4b9a92e37", 0x67}, {&(0x7f0000000a40)="e6c3b42f18da39dc02c4c20907ad2a6685f6827bab1564f4509790a95ed012b2f6b1f7fedb7282a637a418803b0f82adcc61de64ea0ca26e1a0098aa79ba65bdce4524cc07df899f5a62800d4b0cc4d0292e602f84fcaae4001b1083055ca10901dd4dc1bcfc4173", 0x68}, {&(0x7f0000000ac0)="4120acfd28f472f7c3f929e13aef331ad5ab73c907565c01ade3286e26e179bcb8e5ee5bfa3817f98cd3889de7753a79e38364a94003676c7275bd700a137700f1909007fae0970c462b9de3e3", 0x4d}], 0x4, &(0x7f0000000b40)="8f0fdc5cc4eab3ebc9c93a9c6df81b945d9c7cf3ab08bbdd0c134f9580f908974ab845544eaf6d52134060fd34e0c93f75e0e3f18063de3cb2c3dee25b13adfd7ecdd096475ca31d338a2faf1a668dd6b1b5a22543efc7420d4daa68dae6e9b591756f8265b5c61c65ffede8b867444f93a11b7e45ef8f59e2796fc39b26d4612cfbd2c3ce528a30466f8eb67d32da011b1a844da51c003e998a08a96fc440609f01", 0xa2, 0x10090}, 0x4000004) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup/syz0\x00', 0x1ff) ptrace$peeksig(0x4209, 0x0, &(0x7f0000000240)={0x1fe, 0x0, 0x2}, &(0x7f0000000740)=[{}, {}]) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000680)) waitid(0xf04cb06e96ae95f3, 0x0, &(0x7f0000000400), 0x80000000, &(0x7f0000000580)) 12:45:30 executing program 0: syz_mount_image$vfat(&(0x7f0000001200), &(0x7f0000001240)='./bus\x00', 0x0, &(0x7f0000000080)=ANY=[], 0x9, 0x1207, &(0x7f00000017c0)="$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") r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000200)='./bus\x00', 0x2) 12:45:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext3\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) 12:45:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x2e}, @exit], &(0x7f0000000180)='GPL\x00', 0x3, 0xe5, &(0x7f0000000240)=""/229, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:45:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext3\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$eJzs3TFoM2UcBvDnLomf/b4gVRdBUEFEtFDqJrjURaEgpYgIKlREXJRWqC1urZOLg84qnVyKuFkdpUtxUQSnqh3qImhxsDjoELlcK9VGFFNz8t3vB5fcJe97//e4e95kOS5Aa00nmU/SSTKTpJekON/grnqZPt3cntpfTgaDx38shu3q7dpZv2tJtpI8mGSvLPJiN9nYffro54NH731jvXfPe7tPTU30IE8dHx0+dvLu4usfLjyw8fmX3y8WmU//D8d1+YoRn3WL5Jb/otj/RNFtegT8E0uvfvBVlftbk9w9zH8vZeqT9+baDXu93P/OX/V964cvbp/kWIHLNxj0qt/ArQHQOmWSfopyNkm9Xpazs/V/+K87V8uXVtdemXlhdX3l+aZnKuCy9JPDRz6+8tG1P+X/u06df+D6VeX/iaWdb6r1k07TowEmqcr/zLOb90X+oXXkH9pL/qG95B/aS/6hveQf2kv+ob3kH9pL/qG95B/a63z+AYB2GVxp+g5koClNzz8AAAAAAAAAAAAAAAAAAMBF21P7y2fLpGp++nZy/HCS7qj6neHziJMbh69XfyqqZr8r6m5jeebOMXcwpvcbvvv6pm+brf/ZHc3W31xJtl5LMtftXrz+itPr79+7+W++7z03ZoExPfRks/V/3Wm2/sJB8kk1/8yNmn/K3DZ8Hz3/9KvzN2b9l38ZcwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABMzG8BAAD//8n0bSk=") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) syz_mount_image$ext4(&(0x7f0000000240)='ext3\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") (async) openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) (async) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) (async) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) (async) write(r2, &(0x7f0000000740)='foo', 0x3) (async) 12:45:31 executing program 2: r0 = socket(0xa, 0x3, 0x3a) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'veth1_virt_wifi\x00', 0x0}) r3 = socket(0xa, 0x3, 0x3a) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'bridge0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000240)={0x1, 0x0, 0x0, r5}, 0xc) setsockopt$MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000240)={0x0, 0x0, 0x0, r2}, 0xc) setsockopt$MRT6_FLUSH(r0, 0x29, 0xd4, &(0x7f0000000280)=0x9, 0x4) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 12:45:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x54, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0xb}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x54}}, 0x0) [ 2865.288819][ T2530] veth1_virt_wifi: entered allmulticast mode [ 2865.302455][ T2530] veth1_virt_wifi: left allmulticast mode 12:45:37 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg\x00', 0x6}) ioctl$TUNSETOFFLOAD(r0, 0x400454c8, 0x0) 12:45:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext3\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) syz_mount_image$ext4(&(0x7f0000000240)='ext3\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") (async) openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) (async) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) (async) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) (async) write(r2, &(0x7f0000000740)='foo', 0x3) (async) 12:45:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x54, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0xb}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x54}}, 0x0) 12:45:37 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207380902"], 0x10}}, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r1, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000080)={{{@in=@local, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x3c}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x3}}, 0xe8) sendmsg$key(r1, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={0x0}}, 0x0) 12:45:37 executing program 4: syz_open_procfs(0x0, &(0x7f0000000040)='schedstat\x00') prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getrlimit(0xa, &(0x7f0000000000)) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) gettid() capget(&(0x7f0000000f00)={0x20071026}, &(0x7f0000000f40)={0x20001, 0x5d, 0x9, 0x10000, 0x3ff, 0x6}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r0, 0x8, &(0x7f00000003c0)=0xaa) socket$tipc(0x1e, 0x0, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) r4 = signalfd4(r3, &(0x7f0000000f80)={[0x7cb]}, 0x8, 0x800) bind$unix(r4, &(0x7f0000000fc0)=@abs={0x1, 0x0, 0x4e21}, 0x6e) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xffffffffffffffff, r5, 0x0) sendmmsg$unix(r1, &(0x7f0000000980), 0x400000000000120, 0x4008000) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000c40)='/proc/tty/ldiscs\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x20000023896) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x2, {{0x42, 0x4}, 0x3}}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000480)="35d02ffde324f2876dc258fe2fd09aea54d784c417acbfea424a6c93f8dd62e49dfd41f4ef2f48acbfc34121852852e28481130e18d96871a0c9e7e74dbb19cd82281fcf6adedf91b6d7c099fe866636b7d83e3471894a4c738b742a732ee9ccdcdc3ae09ae72ec128d54b3677a5433ea6dec81b769cbddb59b89eb28f36086056e09dca9be14b5b3ab694a11dd9d6bedbc62579b704b8e0030c2d751da90e619c71a51976b3f04e244841e5f868e3c2f471ef81ee048f59b447d31d021707743ab71638aa420bbc34d446cf2901b927858315790162d6e1b1f04e111e", 0xdd}, {&(0x7f00000009c0)="7fd82a1b80e5a0d7654f2bd615e1451126643ad972e4107906c4506cffadf79f2ea02eab1d54ee3ae742484a2b9d85983ad7cf2e66b43d35224147d6a61cdaa4ec0bc9d8194ee7266e4f4e68eab0e5e4299e4c227202d3ab92ad18f6fa71f2d83411e4b9a92e37", 0x67}, {&(0x7f0000000a40)="e6c3b42f18da39dc02c4c20907ad2a6685f6827bab1564f4509790a95ed012b2f6b1f7fedb7282a637a418803b0f82adcc61de64ea0ca26e1a0098aa79ba65bdce4524cc07df899f5a62800d4b0cc4d0292e602f84fcaae4001b1083055ca10901dd4dc1bcfc4173", 0x68}, {&(0x7f0000000ac0)="4120acfd28f472f7c3f929e13aef331ad5ab73c907565c01ade3286e26e179bcb8e5ee5bfa3817f98cd3889de7753a79e38364a94003676c7275bd700a137700f1909007fae0970c462b9de3e3", 0x4d}], 0x4, &(0x7f0000000b40)="8f0fdc5cc4eab3ebc9c93a9c6df81b945d9c7cf3ab08bbdd0c134f9580f908974ab845544eaf6d52134060fd34e0c93f75e0e3f18063de3cb2c3dee25b13adfd7ecdd096475ca31d338a2faf1a668dd6b1b5a22543efc7420d4daa68dae6e9b591756f8265b5c61c65ffede8b867444f93a11b7e45ef8f59e2796fc39b26d4612cfbd2c3ce528a30466f8eb67d32da011b1a844da51c003e998a08a96fc440609f01", 0xa2, 0x10090}, 0x4000004) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup/syz0\x00', 0x1ff) ptrace$peeksig(0x4209, 0x0, &(0x7f0000000240)={0x1fe, 0x0, 0x2}, &(0x7f0000000740)=[{}, {}]) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000680)) waitid(0xf04cb06e96ae95f3, 0x0, &(0x7f0000000400), 0x80000000, &(0x7f0000000580)) 12:45:37 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x2e240915) r1 = request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000380)='\x00', r0) keyctl$get_security(0x11, r1, &(0x7f00000003c0)=""/160, 0xa0) r2 = add_key(&(0x7f0000000180)='.dead\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$link(0x8, 0x0, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x804c1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5acf399e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) removexattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000740)=ANY=[@ANYBLOB="757365722e265d2a00e08b3c51ce34ad9d3033b162995ad51ad6fd2adc881af2960d23388f68ce5065c24665999d6ad80d08666dfc497dfae9c6612f64868f41f9e50fc88e000d5d49c136e5af73360030d0e3c099bf34da6619296e09653c071eff8741dfdd53b6d5672de00250b51eda083288ffaac66116e5bcd2c8607aab63f0d5b41c958cd5a4d024465f9eccc6601d4d30b31a5ed90848c076ac255eb5efa077c2e7864f5a72bc3609e16052d6f406337623288776cf641a76a5caf76f0000000000000000007ddaf14eb2934bdc8facce1ad65b99e7dace7546c065bd39ea96fd5d4b12192c04969c3efb04221b0d59fe7032ff49ef76da3670c72a49274afe77b4980f2d64e6192ff68e78e3a1a2818f91de042becbc373416f7c0f022cb8f6bc395277e9b107d10b6cca7fef6c7b723ca91e2195cfac15afde67564e5be03f201f69d95d24a01a69f17fceb825195429fa7e7f2d92c6bf3ebe52a6dcf9bedb0c0988f613cb4fef3e1cbecfee8f7a81e1e579818f2bbeb2154026da01a31d31f2a9410b2c70ed8"]) r4 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r6 = socket$can_bcm(0x1d, 0x2, 0x2) r7 = add_key(&(0x7f00000004c0)='.request_key_auth\x00', &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000000540)="abc9f0773d4db62f0b58eac993ed3858bc43e3a717d61c0e2e9bc0da72c6e4a2230d90ebb95d2bc3093ad6cb04c5c601c2099a020b17cf695c21044efa10387a25f48a0306d1ba85bb58cad66a1d648c6859e9c9375c9d67925eba3f5edf03c73833f9d9c08317d3c27db11ce26f75d9d21aed05921c11853a8a6537c10538575042ce149aff22339a2739434a658e8f92535eadb4e3c18836f28e0e28e83380113a1ff37267a743fea8df8ce21a43ef44793eb26b02fe394bbd61bc46a62e48040fffbf74d55656009e7ad9e3c568b61299f64c384cc3714557abbfe2a8433098df", 0xe2, r1) keyctl$link(0x8, r7, r0) r8 = add_key$fscrypt_provisioning(&(0x7f0000000680), &(0x7f00000006c0)={'syz', 0x3}, &(0x7f0000000a40)=ANY=[@ANYBLOB="b4273f33000000006161616161616161616161616161616161616161616161616161616161397f917c61616131313131313131313131313131313131313131313131313131313131313131"], 0x48, r2) keyctl$read(0xb, r8, 0x0, 0x0) connect$can_bcm(r6, &(0x7f0000000000), 0x10) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r3, 0x9) sendmsg$can_bcm(r6, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r5, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="01000000d7fe63dfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r4, @ANYBLOB="4ebb440701"], 0x20000600}}, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000000c0)=0x1000) r9 = socket$inet6(0xa, 0x400000000001, 0x0) r10 = open(&(0x7f0000000300)='./bus\x00', 0x143042, 0x0) ftruncate(r10, 0x2006fff) add_key$keyring(&(0x7f0000000940), &(0x7f0000000900)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)=ANY=[], 0x17c}}, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r4) close(r9) open(&(0x7f00000002c0)='./bus\x00', 0x145842, 0x158) sendfile(r9, r9, 0x0, 0x205000) 12:45:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x54, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0xb}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x54}}, 0x0) 12:45:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x54, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0xb}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x54}}, 0x0) 12:45:37 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x4, 0x103382) r1 = memfd_create(&(0x7f0000000480)='\x02\a\xc5(\xec[r\xe1:', 0x0) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000580)='?', 0x1}], 0x1, 0x81806, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x84000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x800, 0x102) fsync(r0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000340)={r5, 0x1, 0xffffffffffffff32, 0x1000}) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$pidfd(0xffffffffffffff9c, &(0x7f0000003100), 0x801, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x8081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) fallocate(0xffffffffffffffff, 0x100000011, 0xff970000, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r7, 0x8923, &(0x7f0000000040)={'tunl0\x00', &(0x7f0000000280)=ANY=[]}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f0000001040)={'gre0\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="73797a746e6c320000000000fffffffe", @ANYRES32, @ANYBLOB="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"]}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x7a, &(0x7f0000000740)=':\xb6\x8d$\xe6k/\xc3\xaf\xa5\x96?X\x8b\x16H\x0f/\xceB\x8f8\x93\x81\x83v\x86.\\;\xfb\xfdn\x03NP\xe3\x87\xe7\xd0\xed*/\xda\xe56OP\xdfy*\x8b\xaf\x00\xe9b?\x9a/\xfd\x0e\x18\xc3\x91\xa5H\x9b\xd6J\x89\xd9\xc6\xcc\x06\xe1\\\xc6\x13\xa6c\xd4\x95n\xe2\x81\xef$\xbc\x02\x06c\x88WH\xbf\xa47\xf4\xb7\x97=&\xdb\xdc\xdb\x84\xe2\n\xc2=\xd3n\xdb\xc1by\xd5\xae\x95g'}, 0x30) socket$inet_udp(0x2, 0x2, 0x0) sendfile(r1, r0, 0x0, 0x24002da8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.stat\x00', 0x275a, 0x0) 12:45:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$eJzs3TFoM2UcBvDnLomf/b4gVRdBUEFEtFDqJrjURaEgpYgIKlREXJRWqC1urZOLg84qnVyKuFkdpUtxUQSnqh3qImhxsDjoELlcK9VGFFNz8t3vB5fcJe97//e4e95kOS5Aa00nmU/SSTKTpJekON/grnqZPt3cntpfTgaDx38shu3q7dpZv2tJtpI8mGSvLPJiN9nYffro54NH731jvXfPe7tPTU30IE8dHx0+dvLu4usfLjyw8fmX3y8WmU//D8d1+YoRn3WL5Jb/otj/RNFtegT8E0uvfvBVlftbk9w9zH8vZeqT9+baDXu93P/OX/V964cvbp/kWIHLNxj0qt/ArQHQOmWSfopyNkm9Xpazs/V/+K87V8uXVtdemXlhdX3l+aZnKuCy9JPDRz6+8tG1P+X/u06df+D6VeX/iaWdb6r1k07TowEmqcr/zLOb90X+oXXkH9pL/qG95B/aS/6hveQf2kv+ob3kH9pL/qG95B/a63z+AYB2GVxp+g5koClNzz8AAAAAAAAAAAAAAAAAAMBF21P7y2fLpGp++nZy/HCS7qj6neHziJMbh69XfyqqZr8r6m5jeebOMXcwpvcbvvv6pm+brf/ZHc3W31xJtl5LMtftXrz+itPr79+7+W++7z03ZoExPfRks/V/3Wm2/sJB8kk1/8yNmn/K3DZ8Hz3/9KvzN2b9l38ZcwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABMzG8BAAD//8n0bSk=") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x80800) fsync(r2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r3, &(0x7f0000000740)='foo', 0x3) 12:45:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") (async) r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x80800) fsync(r2) (async) r3 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r3, &(0x7f0000000740)='foo', 0x3) [ 2871.570491][ T2568] €: renamed from tunl0 12:45:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x80800) fsync(r2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r3, &(0x7f0000000740)='foo', 0x3) 12:45:44 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg\x00', 0x6}) ioctl$TUNSETOFFLOAD(r0, 0x400454c8, 0x0) 12:45:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) waitid(0x1, 0x0, &(0x7f0000000000), 0x1000000, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) 12:45:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}, 0x1, 0xba01}, 0x0) 12:45:44 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x2e240915) r1 = request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000380)='\x00', r0) keyctl$get_security(0x11, r1, &(0x7f00000003c0)=""/160, 0xa0) r2 = add_key(&(0x7f0000000180)='.dead\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$link(0x8, 0x0, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x804c1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5acf399e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) removexattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000740)=ANY=[@ANYBLOB="757365722e265d2a00e08b3c51ce34ad9d3033b162995ad51ad6fd2adc881af2960d23388f68ce5065c24665999d6ad80d08666dfc497dfae9c6612f64868f41f9e50fc88e000d5d49c136e5af73360030d0e3c099bf34da6619296e09653c071eff8741dfdd53b6d5672de00250b51eda083288ffaac66116e5bcd2c8607aab63f0d5b41c958cd5a4d024465f9eccc6601d4d30b31a5ed90848c076ac255eb5efa077c2e7864f5a72bc3609e16052d6f406337623288776cf641a76a5caf76f0000000000000000007ddaf14eb2934bdc8facce1ad65b99e7dace7546c065bd39ea96fd5d4b12192c04969c3efb04221b0d59fe7032ff49ef76da3670c72a49274afe77b4980f2d64e6192ff68e78e3a1a2818f91de042becbc373416f7c0f022cb8f6bc395277e9b107d10b6cca7fef6c7b723ca91e2195cfac15afde67564e5be03f201f69d95d24a01a69f17fceb825195429fa7e7f2d92c6bf3ebe52a6dcf9bedb0c0988f613cb4fef3e1cbecfee8f7a81e1e579818f2bbeb2154026da01a31d31f2a9410b2c70ed8"]) r4 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r6 = socket$can_bcm(0x1d, 0x2, 0x2) r7 = add_key(&(0x7f00000004c0)='.request_key_auth\x00', &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000000540)="abc9f0773d4db62f0b58eac993ed3858bc43e3a717d61c0e2e9bc0da72c6e4a2230d90ebb95d2bc3093ad6cb04c5c601c2099a020b17cf695c21044efa10387a25f48a0306d1ba85bb58cad66a1d648c6859e9c9375c9d67925eba3f5edf03c73833f9d9c08317d3c27db11ce26f75d9d21aed05921c11853a8a6537c10538575042ce149aff22339a2739434a658e8f92535eadb4e3c18836f28e0e28e83380113a1ff37267a743fea8df8ce21a43ef44793eb26b02fe394bbd61bc46a62e48040fffbf74d55656009e7ad9e3c568b61299f64c384cc3714557abbfe2a8433098df", 0xe2, r1) keyctl$link(0x8, r7, r0) r8 = add_key$fscrypt_provisioning(&(0x7f0000000680), &(0x7f00000006c0)={'syz', 0x3}, &(0x7f0000000a40)=ANY=[@ANYBLOB="b4273f33000000006161616161616161616161616161616161616161616161616161616161397f917c61616131313131313131313131313131313131313131313131313131313131313131"], 0x48, r2) keyctl$read(0xb, r8, 0x0, 0x0) connect$can_bcm(r6, &(0x7f0000000000), 0x10) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r3, 0x9) sendmsg$can_bcm(r6, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r5, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="01000000d7fe63dfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r4, @ANYBLOB="4ebb440701"], 0x20000600}}, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000000c0)=0x1000) r9 = socket$inet6(0xa, 0x400000000001, 0x0) r10 = open(&(0x7f0000000300)='./bus\x00', 0x143042, 0x0) ftruncate(r10, 0x2006fff) add_key$keyring(&(0x7f0000000940), &(0x7f0000000900)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)=ANY=[], 0x17c}}, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r4) close(r9) open(&(0x7f00000002c0)='./bus\x00', 0x145842, 0x158) sendfile(r9, r9, 0x0, 0x205000) 12:45:44 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x4, 0x103382) r1 = memfd_create(&(0x7f0000000480)='\x02\a\xc5(\xec[r\xe1:', 0x0) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000580)='?', 0x1}], 0x1, 0x81806, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x84000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x800, 0x102) fsync(r0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000340)={r5, 0x1, 0xffffffffffffff32, 0x1000}) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000800000095000000000000009500a5050000000077d8f3b423cdac85800000000000000024e16ad10a48b243ccc42606d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb292f7d3acec77f5efad9c1165a0e3ccae669e173a649c1cfd6587d452d66b7cc957d77578f4c35235138d5521f9453559c3421eed73d5661cfeecf9c66cf6dd6dcd54c3b3ff02000000d7c983c044c03bf3a48dfe3e26e7a23129d6606fd28a69989d552af6bda9df2c3af36effff050011bbecc2f4a37c9af2551ce935b0f327cb3f011a7d069111d5a34ed09baafa9e87110bd5602e2fd5234712596b696418f163d1a13ed38ae89d24e1cebfba2fc7925bfacbb03109753f541cd027edd68149ee99eebc6f7d6dd4aed4af7588c8e1b44ccb19e810879b70a70000000000000000000000d7900a820b63278f4e9a217b98000000002a92895614cd50cbe43a1ed25268816b00000000000009d27d753a30a147b24a48435bd8a568669596e9e08679b3ce48e90defb6670c3d62ad0a97aec773713a66b223fa8b148871c8d31d24291c25449f106a99893ed20fa7a050fbbef90327e827e513e96068fd1e8a43e89f9c050022a961546ed5365470fa503c1fac35b903e10c62bebc943c17ff1432d0881406bc176e3e69ee52b59d13182e1f24ed200ada12f7a1525320e71666f472a97214d0b2874df30ed5eb1affb87ba55b2d72078e9f40e4ffff06aabca77e64c988dd413230d68c78a15be9771bf00a7f7681314df1c2abe69cb47be5329ac624fb2997df9e6867583a4b239d17ba83b4973cd9bcddd186acbc7a967e41f61fe4382601bff5f5dbcd3d50a065bcc67943bae4f2a5366ca6d291f931d9cde41bdabdae4717317621abaa7179e2d44f8ebca654f9e45719b70d2c49769e309fc99f6320f46740bb9a5e359804c2653d19462139d5c505dc6e4f178c9a098b51333cccfe0d2eb41dd079de3cfa60365787ca4b8eb920b728046e2d8699b7eda06969c5da49fc87"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$pidfd(0xffffffffffffff9c, &(0x7f0000003100), 0x801, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x8081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) fallocate(0xffffffffffffffff, 0x100000011, 0xff970000, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r7, 0x8923, &(0x7f0000000040)={'tunl0\x00', &(0x7f0000000280)=ANY=[]}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f0000001040)={'gre0\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="73797a746e6c320000000000fffffffe", @ANYRES32, @ANYBLOB="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"]}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x7a, &(0x7f0000000740)=':\xb6\x8d$\xe6k/\xc3\xaf\xa5\x96?X\x8b\x16H\x0f/\xceB\x8f8\x93\x81\x83v\x86.\\;\xfb\xfdn\x03NP\xe3\x87\xe7\xd0\xed*/\xda\xe56OP\xdfy*\x8b\xaf\x00\xe9b?\x9a/\xfd\x0e\x18\xc3\x91\xa5H\x9b\xd6J\x89\xd9\xc6\xcc\x06\xe1\\\xc6\x13\xa6c\xd4\x95n\xe2\x81\xef$\xbc\x02\x06c\x88WH\xbf\xa47\xf4\xb7\x97=&\xdb\xdc\xdb\x84\xe2\n\xc2=\xd3n\xdb\xc1by\xd5\xae\x95g'}, 0x30) socket$inet_udp(0x2, 0x2, 0x0) sendfile(r1, r0, 0x0, 0x24002da8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.stat\x00', 0x275a, 0x0) 12:45:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@func={0x1, 0x2}]}, {0x0, [0x5f, 0x30]}}, &(0x7f00000003c0)=""/251, 0x28, 0xfb, 0x1}, 0x20) 12:45:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) (async) r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) waitid(0x1, 0x0, &(0x7f0000000000), 0x1000000, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) (async) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) 12:45:44 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xff) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000580)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) sendmsg$unix(r1, &(0x7f0000000780)={&(0x7f0000000000)=@abs, 0x6e, 0x0}, 0x0) 12:45:44 executing program 4: r0 = socket(0x28, 0x5, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000140)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @local, 0x0, 0x0, 0x5}}) 12:45:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) waitid(0x1, 0x0, &(0x7f0000000000), 0x1000000, 0x0) (async) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) 12:45:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$eJzs3TFoM2UcBvDnLomf/b4gVRdBUEFEtFDqJrjURaEgpYgIKlREXJRWqC1urZOLg84qnVyKuFkdpUtxUQSnqh3qImhxsDjoELlcK9VGFFNz8t3vB5fcJe97//e4e95kOS5Aa00nmU/SSTKTpJekON/grnqZPt3cntpfTgaDx38shu3q7dpZv2tJtpI8mGSvLPJiN9nYffro54NH731jvXfPe7tPTU30IE8dHx0+dvLu4usfLjyw8fmX3y8WmU//D8d1+YoRn3WL5Jb/otj/RNFtegT8E0uvfvBVlftbk9w9zH8vZeqT9+baDXu93P/OX/V964cvbp/kWIHLNxj0qt/ArQHQOmWSfopyNkm9Xpazs/V/+K87V8uXVtdemXlhdX3l+aZnKuCy9JPDRz6+8tG1P+X/u06df+D6VeX/iaWdb6r1k07TowEmqcr/zLOb90X+oXXkH9pL/qG95B/aS/6hveQf2kv+ob3kH9pL/qG95B/a63z+AYB2GVxp+g5koClNzz8AAAAAAAAAAAAAAAAAAMBF21P7y2fLpGp++nZy/HCS7qj6neHziJMbh69XfyqqZr8r6m5jeebOMXcwpvcbvvv6pm+brf/ZHc3W31xJtl5LMtftXrz+itPr79+7+W++7z03ZoExPfRks/V/3Wm2/sJB8kk1/8yNmn/K3DZ8Hz3/9KvzN2b9l38ZcwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABMzG8BAAD//8n0bSk=") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) pwritev2(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="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", 0xfa}], 0x1, 0x7f, 0x1, 0x5) 12:45:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) (async) pwritev2(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="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", 0xfa}], 0x1, 0x7f, 0x1, 0x5) 12:45:52 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x4, 0x103382) r1 = memfd_create(&(0x7f0000000480)='\x02\a\xc5(\xec[r\xe1:', 0x0) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000580)='?', 0x1}], 0x1, 0x81806, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x84000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x800, 0x102) fsync(r0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000340)={r5, 0x1, 0xffffffffffffff32, 0x1000}) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000800000095000000000000009500a5050000000077d8f3b423cdac85800000000000000024e16ad10a48b243ccc42606d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb292f7d3acec77f5efad9c1165a0e3ccae669e173a649c1cfd6587d452d66b7cc957d77578f4c35235138d5521f9453559c3421eed73d5661cfeecf9c66cf6dd6dcd54c3b3ff02000000d7c983c044c03bf3a48dfe3e26e7a23129d6606fd28a69989d552af6bda9df2c3af36effff050011bbecc2f4a37c9af2551ce935b0f327cb3f011a7d069111d5a34ed09baafa9e87110bd5602e2fd5234712596b696418f163d1a13ed38ae89d24e1cebfba2fc7925bfacbb03109753f541cd027edd68149ee99eebc6f7d6dd4aed4af7588c8e1b44ccb19e810879b70a70000000000000000000000d7900a820b63278f4e9a217b98000000002a92895614cd50cbe43a1ed25268816b00000000000009d27d753a30a147b24a48435bd8a568669596e9e08679b3ce48e90defb6670c3d62ad0a97aec773713a66b223fa8b148871c8d31d24291c25449f106a99893ed20fa7a050fbbef90327e827e513e96068fd1e8a43e89f9c050022a961546ed5365470fa503c1fac35b903e10c62bebc943c17ff1432d0881406bc176e3e69ee52b59d13182e1f24ed200ada12f7a1525320e71666f472a97214d0b2874df30ed5eb1affb87ba55b2d72078e9f40e4ffff06aabca77e64c988dd413230d68c78a15be9771bf00a7f7681314df1c2abe69cb47be5329ac624fb2997df9e6867583a4b239d17ba83b4973cd9bcddd186acbc7a967e41f61fe4382601bff5f5dbcd3d50a065bcc67943bae4f2a5366ca6d291f931d9cde41bdabdae4717317621abaa7179e2d44f8ebca654f9e45719b70d2c49769e309fc99f6320f46740bb9a5e359804c2653d19462139d5c505dc6e4f178c9a098b51333cccfe0d2eb41dd079de3cfa60365787ca4b8eb920b728046e2d8699b7eda06969c5da49fc87"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$pidfd(0xffffffffffffff9c, &(0x7f0000003100), 0x801, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x8081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) fallocate(0xffffffffffffffff, 0x100000011, 0xff970000, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r7, 0x8923, &(0x7f0000000040)={'tunl0\x00', &(0x7f0000000280)=ANY=[]}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f0000001040)={'gre0\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="73797a746e6c320000000000fffffffe", @ANYRES32, @ANYBLOB="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"]}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x7a, &(0x7f0000000740)=':\xb6\x8d$\xe6k/\xc3\xaf\xa5\x96?X\x8b\x16H\x0f/\xceB\x8f8\x93\x81\x83v\x86.\\;\xfb\xfdn\x03NP\xe3\x87\xe7\xd0\xed*/\xda\xe56OP\xdfy*\x8b\xaf\x00\xe9b?\x9a/\xfd\x0e\x18\xc3\x91\xa5H\x9b\xd6J\x89\xd9\xc6\xcc\x06\xe1\\\xc6\x13\xa6c\xd4\x95n\xe2\x81\xef$\xbc\x02\x06c\x88WH\xbf\xa47\xf4\xb7\x97=&\xdb\xdc\xdb\x84\xe2\n\xc2=\xd3n\xdb\xc1by\xd5\xae\x95g'}, 0x30) socket$inet_udp(0x2, 0x2, 0x0) sendfile(r1, r0, 0x0, 0x24002da8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.stat\x00', 0x275a, 0x0) 12:45:52 executing program 4: setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000100)={0x0, 0x1, 0x6, @remote}, 0x10) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x200000100000011, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'xfrm0\x00', 0x0}) sendto$packet(r1, &(0x7f0000000100)='m', 0x42, 0x0, &(0x7f0000000200)={0x2f, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) 12:45:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) (async) pwritev2(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="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", 0xfa}], 0x1, 0x7f, 0x1, 0x5) 12:45:52 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0xc) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 12:45:52 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000680), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)={0x44, r2, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast2}]}, 0x44}, 0x1, 0x0, 0x0, 0x4040014}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000680), r3) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r5, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x60, r4, 0x20, 0x70bd2d, 0x25dfdbff, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0xb974fc9d0b202b89}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @loopback}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @local}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @rand_addr=' \x01\x00'}]}, 0x60}, 0x1, 0x0, 0x0, 0x8000}, 0x80) sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000080)={0x4c, 0x0, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @dev}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @local}, @NLBL_MGMT_A_DOMAIN={0x5, 0x1, '\x00'}]}, 0x4c}}, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f00000009c0), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) 12:45:52 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000080)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) 12:45:52 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'veth1_vlan\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000100)=@bridge_delneigh={0x28, 0x1d, 0xc07, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0x0, 0x18}, [@NDA_LLADDR={0xa}]}, 0x28}}, 0x0) 12:45:52 executing program 3: sendmmsg$sock(0xffffffffffffffff, &(0x7f00000003c0)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000080)="05000000facaabad", 0x8}], 0x1}}], 0x1, 0x0) r0 = fsopen(&(0x7f0000000000)='debugfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000080)='context', &(0x7f00000000c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000040)='\x06\x00', &(0x7f0000000100)='cpuacct.stat\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 12:45:52 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000557cf160183fc5820cfbd1102800000000000000000000000000000000000000000000000000000000000000ae0000000040000000ef31746258dc346413862dec8e31106ab9fc6019bd7d39285f96f56887107cf9d4405ead0f16", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f407cde363c02dfc6283aee931e5dcbf938ed1b084c95f8079217da820fb5789fec7a430ba5505aa6cddc3afbeb7451e0f07789c94ebd3c6514"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {r1}}, 'mnt\x00'}) mkdirat(r2, &(0x7f0000000640)='mnt\x00', 0x1c0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r4 = openat(r0, &(0x7f0000000000)='./mnt\x00', 0x42000, 0x100) r5 = openat(r4, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x81002, 0x184) write(r5, &(0x7f0000000740)='foo', 0x3) 12:45:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000040)={@in6={{0xa, 0x0, 0x0, @private0}}, 0x0, 0x0, 0x41, 0x0, "6aa9a0fcfc3caa9a7c7e866c1f777264989af4c041b602be60d81932c085c8f970765b15e402810f8279407c6ab9d72f4407c2f078e26271c3848b4700b6c06ec5137af6cf6bf49760346636e3483eb1"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @private2}}, 0x0, 0x0, 0x44, 0x0, "f9af26f1e027fa2a5629e68d5c6045acf0216df14216392df66d9ee25dc77e5c80e1be80db751e2d3a89ae8b0d0afef7ae5cabd5cbcdeeed453bc9c1fe3d609b9d5eacd7783476da17d4ec738b53ee14"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in6={{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x0, 0x18, 0x0, "1454e68d32ec282e4f2c73b520d4685d869b6142c0926f43ec576fa4f833f36b9a1f287661068911e7ddd601cdafbc63f349fb07978433f56e0a8d95e06513f9f7c8c65f79f008bfcac86c631a2712f1"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x0, 0x0, @private0}}, 0x0, 0x0, 0x0, 0x0, "8006a0164b9503ef17a3f2a13c5a5087c5b02f68216de71193d8d6a6251449b0251b38671f27caa6c208559156980d92ee251b51f87bbd7434c1bff207e636c4624553973425577235e4057cbcae08dd"}, 0xd8) 12:45:52 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000040)={0x20000004}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) ppoll(&(0x7f0000000280)=[{r3, 0x1}], 0x1, &(0x7f0000000300)={0x0, r4+60000000}, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getuid() socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, 0x0, &(0x7f0000000180)) 12:45:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000a00)={'team0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)=@bridge_newneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0x0, 0x4b}, [@NDA_LLADDR={0xa, 0x2, @link_local}]}, 0x28}}, 0x0) [ 2886.731777][ T25] audit: type=1400 audit(1682858752.548:1158): avc: denied { mount } for pid=2702 comm="syz-executor.3" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 12:45:53 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x4, 0x103382) r1 = memfd_create(&(0x7f0000000480)='\x02\a\xc5(\xec[r\xe1:', 0x0) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000580)='?', 0x1}], 0x1, 0x81806, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x84000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x800, 0x102) fsync(r0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000340)={r5, 0x1, 0xffffffffffffff32, 0x1000}) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$pidfd(0xffffffffffffff9c, &(0x7f0000003100), 0x801, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x8081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) fallocate(0xffffffffffffffff, 0x100000011, 0xff970000, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r7, 0x8923, &(0x7f0000000040)={'tunl0\x00', &(0x7f0000000280)=ANY=[]}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f0000001040)={'gre0\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="73797a746e6c320000000000fffffffe", @ANYRES32, @ANYBLOB="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"]}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x7a, &(0x7f0000000740)=':\xb6\x8d$\xe6k/\xc3\xaf\xa5\x96?X\x8b\x16H\x0f/\xceB\x8f8\x93\x81\x83v\x86.\\;\xfb\xfdn\x03NP\xe3\x87\xe7\xd0\xed*/\xda\xe56OP\xdfy*\x8b\xaf\x00\xe9b?\x9a/\xfd\x0e\x18\xc3\x91\xa5H\x9b\xd6J\x89\xd9\xc6\xcc\x06\xe1\\\xc6\x13\xa6c\xd4\x95n\xe2\x81\xef$\xbc\x02\x06c\x88WH\xbf\xa47\xf4\xb7\x97=&\xdb\xdc\xdb\x84\xe2\n\xc2=\xd3n\xdb\xc1by\xd5\xae\x95g'}, 0x30) socket$inet_udp(0x2, 0x2, 0x0) sendfile(r1, r0, 0x0, 0x24002da8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.stat\x00', 0x275a, 0x0) 12:45:53 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) ioctl$KDSKBSENT(r0, 0x4b33, &(0x7f00000003c0)={0x0, "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"}) 12:45:53 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000557cf160183fc5820cfbd1102800000000000000000000000000000000000000000000000000000000000000ae0000000040000000ef31746258dc346413862dec8e31106ab9fc6019bd7d39285f96f56887107cf9d4405ead0f16", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f407cde363c02dfc6283aee931e5dcbf938ed1b084c95f8079217da820fb5789fec7a430ba5505aa6cddc3afbeb7451e0f07789c94ebd3c6514"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {r1}}, 'mnt\x00'}) mkdirat(r2, &(0x7f0000000640)='mnt\x00', 0x1c0) (async) r3 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) r4 = openat(r0, &(0x7f0000000000)='./mnt\x00', 0x42000, 0x100) r5 = openat(r4, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x81002, 0x184) write(r5, &(0x7f0000000740)='foo', 0x3) 12:45:53 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040), 0x2, 0x0) preadv(r1, &(0x7f0000001400)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1, 0xfffffff7, 0x0) 12:45:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@getnetconf={0x14}, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7}, {0x4}}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001a40)=@delchain={0x38, 0x24, 0xd39, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xffff}}, [@filter_kind_options=@f_bpf={{0x8, 0x2}, {0xc, 0x2, [@TCA_BPF_FLAGS={0x8, 0x8, 0x1}]}}]}, 0x38}}, 0x0) [ 2887.712065][ T2743] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 12:46:05 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) syz_emit_ethernet(0x42, &(0x7f0000000100)={@random="d4fd0807a401", @local, @val={@void}, {@ipv6={0x86dd, @generic={0x0, 0x6, '\x00', 0x8, 0x2c, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, {[], "b77902f7cb2b6717"}}}}}, 0x0) 12:46:05 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 12:46:05 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000557cf160183fc5820cfbd1102800000000000000000000000000000000000000000000000000000000000000ae0000000040000000ef31746258dc346413862dec8e31106ab9fc6019bd7d39285f96f56887107cf9d4405ead0f16", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f407cde363c02dfc6283aee931e5dcbf938ed1b084c95f8079217da820fb5789fec7a430ba5505aa6cddc3afbeb7451e0f07789c94ebd3c6514"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {r1}}, 'mnt\x00'}) mkdirat(r2, &(0x7f0000000640)='mnt\x00', 0x1c0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r4 = openat(r0, &(0x7f0000000000)='./mnt\x00', 0x42000, 0x100) r5 = openat(r4, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x81002, 0x184) write(r5, &(0x7f0000000740)='foo', 0x3) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") (async) openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) (async) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000557cf160183fc5820cfbd1102800000000000000000000000000000000000000000000000000000000000000ae0000000040000000ef31746258dc346413862dec8e31106ab9fc6019bd7d39285f96f56887107cf9d4405ead0f16", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f407cde363c02dfc6283aee931e5dcbf938ed1b084c95f8079217da820fb5789fec7a430ba5505aa6cddc3afbeb7451e0f07789c94ebd3c6514"]) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {r1}}, 'mnt\x00'}) (async) mkdirat(r2, &(0x7f0000000640)='mnt\x00', 0x1c0) (async) openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) (async) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) openat(r0, &(0x7f0000000000)='./mnt\x00', 0x42000, 0x100) (async) openat(r4, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x81002, 0x184) (async) write(r5, &(0x7f0000000740)='foo', 0x3) (async) 12:46:05 executing program 4: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x200, 0x0) ioctl$EVIOCGREP(r0, 0x40084503, &(0x7f0000000380)=""/4096) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x200, 0x0) ioctl$EVIOCGREP(r1, 0x40084503, &(0x7f0000000380)=""/4096) 12:46:05 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000140), 0x76, 0x188001) ioctl$USBDEVFS_FREE_STREAMS(r0, 0xc00c5512, 0x0) 12:46:05 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000002c0)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in6={0x1b, 0x0, 0x0, @empty}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000000)={0x13, 0x10, 0xfa00, {&(0x7f00000004c0), r1, 0x2}}, 0x18) 12:46:05 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'syz_tun\x00', &(0x7f0000002fc0)=@ethtool_link_settings={0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}) 12:46:05 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x13, 0x4, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x25}, [@call={0x79, 0x10}], {0x95, 0x0, 0x6400}}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9b, &(0x7f0000001780)=""/155, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 12:46:05 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect(r0, &(0x7f0000000200)=@nfc, 0x80) 12:46:05 executing program 2: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}]}, 0x1c}}, 0x0) write$nci(r0, &(0x7f00000011c0)=ANY=[@ANYRESDEC], 0xa) 12:46:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) set_mempolicy(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x23a, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0xff05, 0x0, 0x0, {0x0, 0x10, 0x4a00}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}, @IFLA_ADDRESS={0xa}]}, 0x48}}, 0x0) 12:46:05 executing program 5: setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, &(0x7f0000000000), 0x10) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) [ 2899.234055][ T25] audit: type=1400 audit(1682858765.048:1159): avc: denied { connect } for pid=2789 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 12:46:13 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000001c0)={0x600000000000000, 0x0, &(0x7f0000000080)={&(0x7f0000002f80)={0x2, 0x3, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_address={0x3, 0x1, 0x0, 0x0, 0x0, @in={0x2, 0x0, @dev}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_lifetime={0x4, 0x4}]}, 0x78}}, 0x0) 12:46:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) set_mempolicy(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x23a, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0xff05, 0x0, 0x0, {0x0, 0x10, 0x4a00}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}, @IFLA_ADDRESS={0xa}]}, 0x48}}, 0x0) 12:46:13 executing program 2: syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000240)=ANY=[], 0x21, 0x4a6, &(0x7f0000000a40)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000834c0000000000000000000000000000000000000000000000000000fa0061233d0ab81bd5a272720056b4e048622b460405c6df101e7060be7e57e65fc829944265ea90fb44571f228d0d66423306c12a76b03d75581cee8878a85dc9efd690d18f5b66ee3b0246fa90d286351ab78a77330f7311eebf3849bc278a038b87b58b86c907963b8203b4531b2f2b0e3ffb86af63dcb4171e9b1d114f37b4385c915a4fa0f2bf81860a0df4d37082e98e0a10f49d1d2193d4002bbb5893f6"], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xd4, 0x0, &(0x7f00000000c0)) 12:46:13 executing program 1: syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x410, &(0x7f0000000100)=ANY=[], 0x42, 0x527, &(0x7f0000000a80)="$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") syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x1e, &(0x7f0000000040)=ANY=[@ANYRES16=0x0, @ANYRES64=0x0], 0x2, 0x425, &(0x7f00000004c0)="$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") request_key(0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000080), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="01000000d7fe63dfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="4ebb440701"], 0x20000600}}, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) acct(&(0x7f0000000140)='./file1\x00') mount(0x0, &(0x7f0000004300)='.\x00', 0x0, 0x1848423, 0x0) 12:46:13 executing program 5: setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, &(0x7f0000000000), 0x10) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, &(0x7f0000000000), 0x10) (async) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") (async) openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) (async) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) (async) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) (async) write(r2, &(0x7f0000000740)='foo', 0x3) (async) 12:46:13 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000080)=ANY=[@ANYBLOB="01000000ce000073"]) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080), 0xfffffebe}], 0x1) 12:46:13 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7ffffff2}, 0x0) 12:46:13 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000080)=ANY=[@ANYBLOB="01000000ce000073"]) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080), 0xfffffebe}], 0x1) 12:46:13 executing program 5: setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, &(0x7f0000000000), 0x10) (async) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, &(0x7f0000000000), 0x10) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) 12:46:13 executing program 2: syz_emit_ethernet(0x42, &(0x7f0000000000)={@random="715fa4b724c2", @link_local, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "ef84c7", 0x8, 0x11, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @empty, {[], @mlv2_report}}}}}, 0x0) 12:46:13 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') pread64(r0, &(0x7f0000001080)=""/4086, 0xff6, 0x0) 12:46:13 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) rseq(0x0, 0x1f00, 0x0, 0x0) 12:46:20 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000080)=ANY=[@ANYBLOB="01000000ce000073"]) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080), 0xfffffebe}], 0x1) 12:46:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) set_mempolicy(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x23a, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0xff05, 0x0, 0x0, {0x0, 0x10, 0x4a00}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}, @IFLA_ADDRESS={0xa}]}, 0x48}}, 0x0) 12:46:20 executing program 3: getgroups(0x1, &(0x7f0000002280)=[0x0]) 12:46:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) sendmmsg$unix(r0, &(0x7f0000000000), 0x0, 0xf8983e2a076ed71b) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x10040, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000380)=0x20) ioctl$FS_IOC_SETFLAGS(r2, 0x6611, 0x0) renameat2(r1, &(0x7f0000000040)='\x00', r2, &(0x7f0000000080)='mnt\x00', 0x7) r3 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r4, &(0x7f0000000740)='foo', 0x3) 12:46:20 executing program 2: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000a00)={0x28, r0, 0xdc133ba81337fa79, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x28}]}]}, @ETHTOOL_A_STRSET_HEADER={0x4}]}, 0x28}}, 0x0) 12:46:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_buf(r0, 0x1, 0x7, &(0x7f0000000000)=""/4096, &(0x7f0000001000)=0x1000) 12:46:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a80), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void, @val={0xc}}}}, 0x28}}, 0x0) 12:46:20 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000080)=ANY=[@ANYBLOB="01000000ce000073"]) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080), 0xfffffebe}], 0x1) 12:46:20 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000ac0)=@updsa={0x104, 0x1a, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in6=@remote, 0x0, 0x2b}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x25}, [@coaddr={0x14, 0xe, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}, 0x104}}, 0x0) 12:46:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) sendmmsg$unix(r0, &(0x7f0000000000), 0x0, 0xf8983e2a076ed71b) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x10040, 0x0) (async) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000380)=0x20) (async) ioctl$FS_IOC_SETFLAGS(r2, 0x6611, 0x0) renameat2(r1, &(0x7f0000000040)='\x00', r2, &(0x7f0000000080)='mnt\x00', 0x7) (async) r3 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r4, &(0x7f0000000740)='foo', 0x3) 12:46:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) sendmmsg$unix(r0, &(0x7f0000000000), 0x0, 0xf8983e2a076ed71b) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x10040, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) (async) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000380)=0x20) ioctl$FS_IOC_SETFLAGS(r2, 0x6611, 0x0) renameat2(r1, &(0x7f0000000040)='\x00', r2, &(0x7f0000000080)='mnt\x00', 0x7) (async) renameat2(r1, &(0x7f0000000040)='\x00', r2, &(0x7f0000000080)='mnt\x00', 0x7) openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) (async) r3 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r4, &(0x7f0000000740)='foo', 0x3) 12:46:20 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') creat(&(0x7f0000000080)='./bus\x00', 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r1, 0x2008002) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r0, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f00000001c0)={&(0x7f0000000000)=""/5, 0x310000, 0x1000}, 0x20) 12:46:20 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='netlink_extack\x00', r0}, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000003c0)={'batadv_slave_0\x00', 0x0}) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f00000002c0)={0x28, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_CHANNELS_RX_COUNT={0x8}, @ETHTOOL_A_CHANNELS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}]}, 0x28}}, 0x0) 12:46:27 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x10, &(0x7f0000000300), &(0x7f0000000340)=0x8) 12:46:27 executing program 4: syz_emit_ethernet(0x6a, &(0x7f0000000000)={@link_local={0x3}, @dev, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @source_quench={0x5, 0x0, 0x0, 0x0, {0x3, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr, @dev, {[@rr={0x7, 0x7, 0x0, [@empty=0x1000000]}, @timestamp_prespec={0x44, 0x24, 0x0, 0x3, 0x0, [{@loopback}, {@remote}, {@broadcast}, {@multicast2}]}]}}}}}}}, 0x0) 12:46:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='mnt/encrypted_dir/file0\x00', 0x20) 12:46:27 executing program 2: r0 = io_uring_setup(0x4e56, &(0x7f0000000180)={0x0, 0x0, 0x40}) io_uring_register$IORING_REGISTER_RESTRICTIONS(r0, 0xb, &(0x7f00000000c0), 0x0) io_uring_register$IORING_REGISTER_ENABLE_RINGS(r0, 0xc, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) 12:46:27 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="4800000010000507000004000000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)=@delchain={0x24, 0x5f, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x5, 0x2}, {0xd}}}, 0x24}}, 0x0) 12:46:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) set_mempolicy(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x23a, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0xff05, 0x0, 0x0, {0x0, 0x10, 0x4a00}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}, @IFLA_ADDRESS={0xa}]}, 0x48}}, 0x0) 12:46:27 executing program 4: syz_emit_ethernet(0x6a, &(0x7f0000000000)={@link_local={0x3}, @dev, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @source_quench={0x5, 0x0, 0x0, 0x0, {0x3, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr, @dev, {[@rr={0x7, 0x7, 0x0, [@empty=0x1000000]}, @timestamp_prespec={0x44, 0x24, 0x0, 0x3, 0x0, [{@loopback}, {@remote}, {@broadcast}, {@multicast2}]}]}}}}}}}, 0x0) 12:46:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) (async) r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) (async) write(r2, &(0x7f0000000740)='foo', 0x3) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='mnt/encrypted_dir/file0\x00', 0x20) 12:46:27 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffffb7, 0x5, 0x0, 0x0, 0x0, 0x69, 0x10, 0x68}, [@ldst={0x5}]}, &(0x7f00000002c0)='GPL\x00', 0x5, 0xfd90, &(0x7f0000000300)=""/188, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f3, 0x10, &(0x7f0000000080), 0xfffffffffffffc79}, 0x2a) 12:46:27 executing program 4: syz_emit_ethernet(0x6a, &(0x7f0000000000)={@link_local={0x3}, @dev, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @source_quench={0x5, 0x0, 0x0, 0x0, {0x3, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr, @dev, {[@rr={0x7, 0x7, 0x0, [@empty=0x1000000]}, @timestamp_prespec={0x44, 0x24, 0x0, 0x3, 0x0, [{@loopback}, {@remote}, {@broadcast}, {@multicast2}]}]}}}}}}}, 0x0) 12:46:27 executing program 2: ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f00000000c0)="ff") r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xa, 0x3, 0x81, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280), &(0x7f0000000380), 0x7, r0}, 0x38) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000200)={r0, &(0x7f00000000c0), 0x0}, 0x20) 12:46:27 executing program 4: syz_emit_ethernet(0x6a, &(0x7f0000000000)={@link_local={0x3}, @dev, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @source_quench={0x5, 0x0, 0x0, 0x0, {0x3, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr, @dev, {[@rr={0x7, 0x7, 0x0, [@empty=0x1000000]}, @timestamp_prespec={0x44, 0x24, 0x0, 0x3, 0x0, [{@loopback}, {@remote}, {@broadcast}, {@multicast2}]}]}}}}}}}, 0x0) [ 2921.677477][ T2866] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 12:46:31 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000a0c010a1f05fe060c10200308000f00ff00c00e140000001a00ffffba16a0aa1c09000014000000", 0x38}], 0x1}, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x9, 0x7) recvmmsg(r0, &(0x7f00000051c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) 12:46:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$eJzs3TFoM2UcBvDnLomf/b4gVRdBUEFEtFDqJrjURaEgpYgIKlREXJRWqC1urZOLg84qnVyKuFkdpUtxUQSnqh3qImhxsDjoELlcK9VGFFNz8t3vB5fcJe97//e4e95kOS5Aa00nmU/SSTKTpJekON/grnqZPt3cntpfTgaDx38shu3q7dpZv2tJtpI8mGSvLPJiN9nYffro54NH731jvXfPe7tPTU30IE8dHx0+dvLu4usfLjyw8fmX3y8WmU//D8d1+YoRn3WL5Jb/otj/RNFtegT8E0uvfvBVlftbk9w9zH8vZeqT9+baDXu93P/OX/V964cvbp/kWIHLNxj0qt/ArQHQOmWSfopyNkm9Xpazs/V/+K87V8uXVtdemXlhdX3l+aZnKuCy9JPDRz6+8tG1P+X/u06df+D6VeX/iaWdb6r1k07TowEmqcr/zLOb90X+oXXkH9pL/qG95B/aS/6hveQf2kv+ob3kH9pL/qG95B/a63z+AYB2GVxp+g5koClNzz8AAAAAAAAAAAAAAAAAAMBF21P7y2fLpGp++nZy/HCS7qj6neHziJMbh69XfyqqZr8r6m5jeebOMXcwpvcbvvv6pm+brf/ZHc3W31xJtl5LMtftXrz+itPr79+7+W++7z03ZoExPfRks/V/3Wm2/sJB8kk1/8yNmn/K3DZ8Hz3/9KvzN2b9l38ZcwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABMzG8BAAD//8n0bSk=") (async) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) (async) r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='mnt/encrypted_dir/file0\x00', 0x20) 12:46:31 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) listen(r0, 0x5) listen(r0, 0x0) listen(r0, 0xfff) 12:46:31 executing program 2: syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x200810, &(0x7f0000000040)={[{@noquota}, {@barrier}, {@nouid32}, {@grpquota}]}, 0x1, 0x4a6, &(0x7f0000000580)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r2 = dup3(r1, r0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) fallocate(r4, 0x0, 0x0, 0x6) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f00000000c0)={0x0, r3}) write$rfkill(r2, &(0x7f0000000000), 0x8) 12:46:31 executing program 4: r0 = socket(0xa, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000040)=0x2, 0x4) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x8017be1b}) 12:46:31 executing program 0: set_mempolicy(0x3, &(0x7f0000000000)=0xdd, 0x34) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) 12:46:31 executing program 0: set_mempolicy(0x3, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x8002, &(0x7f0000000240)={[{@nodots}, {@fat=@quiet}, {@fat=@flush}, {@dots}, {@fat=@nfs_nostale_ro}, {@nodots}, {@nodots}, {@fat=@check_strict}, {@nodots}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffc6f}}, {@fat=@tz_utc}, {@fat=@dmask={'dmask', 0x3d, 0x1}}, {@nodots}, {@nodots}]}, 0x5, 0x280, &(0x7f0000000780)="$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") 12:46:31 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x20000) ioctl$TIOCGSERIAL(r0, 0x541e, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=""/170}) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="009527fa378f235099128a634ae1e507e0ce5ae7d2470a6ee7334ebb598e0300"], 0x0, 0x236, &(0x7f0000000300)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)=ANY=[@ANYBLOB="0200000000000000000080000000000000000000004b78a992a829fbb5ddbffda9ca823af700000000400000", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f40"]) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r3, &(0x7f0000000740)='foo', 0x3) 12:46:31 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xffffffffffffffff, 0x3f}, 0x0, 0x2, 0x2, 0x3, 0x0, 0xfff, 0x3}, 0xffffffffffffffff, 0xe, r0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$inet(r2, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @rand_addr=0x2f}, 0x10, 0x0}, 0xbb8) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)=0x9, 0x12) 12:46:31 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$netlink(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000000)=0xe, 0x4) 12:46:31 executing program 0: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) r1 = dup(r0) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000000)=0x5, 0x4) sendmmsg$inet(r1, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000000c0)="cc", 0x1}], 0x1}}], 0x1, 0x0) [ 2925.806920][ T2890] sctp: [Deprecated]: syz-executor.1 (pid 2890) Use of struct sctp_assoc_value in delayed_ack socket option. [ 2925.806920][ T2890] Use struct sctp_sack_info instead 12:46:31 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x20000) ioctl$TIOCGSERIAL(r0, 0x541e, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=""/170}) (async) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="009527fa378f235099128a634ae1e507e0ce5ae7d2470a6ee7334ebb598e0300"], 0x0, 0x236, &(0x7f0000000300)="$eJzs3TFoM2UcBvDnLomf/b4gVRdBUEFEtFDqJrjURaEgpYgIKlREXJRWqC1urZOLg84qnVyKuFkdpUtxUQSnqh3qImhxsDjoELlcK9VGFFNz8t3vB5fcJe97//e4e95kOS5Aa00nmU/SSTKTpJekON/grnqZPt3cntpfTgaDx38shu3q7dpZv2tJtpI8mGSvLPJiN9nYffro54NH731jvXfPe7tPTU30IE8dHx0+dvLu4usfLjyw8fmX3y8WmU//D8d1+YoRn3WL5Jb/otj/RNFtegT8E0uvfvBVlftbk9w9zH8vZeqT9+baDXu93P/OX/V964cvbp/kWIHLNxj0qt/ArQHQOmWSfopyNkm9Xpazs/V/+K87V8uXVtdemXlhdX3l+aZnKuCy9JPDRz6+8tG1P+X/u06df+D6VeX/iaWdb6r1k07TowEmqcr/zLOb90X+oXXkH9pL/qG95B/aS/6hveQf2kv+ob3kH9pL/qG95B/a63z+AYB2GVxp+g5koClNzz8AAAAAAAAAAAAAAAAAAMBF21P7y2fLpGp++nZy/HCS7qj6neHziJMbh69XfyqqZr8r6m5jeebOMXcwpvcbvvv6pm+brf/ZHc3W31xJtl5LMtftXrz+itPr79+7+W++7z03ZoExPfRks/V/3Wm2/sJB8kk1/8yNmn/K3DZ8Hz3/9KvzN2b9l38ZcwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABMzG8BAAD//8n0bSk=") (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)=ANY=[@ANYBLOB="0200000000000000000080000000000000000000004b78a992a829fbb5ddbffda9ca823af700000000400000", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f40"]) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) r2 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) r3 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r3, &(0x7f0000000740)='foo', 0x3) 12:46:35 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dvb_usb', 0x204203, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, 0x0, 0x90000180) 12:46:35 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_CONTROL(r0, 0xc0105500, &(0x7f0000000040)={0x80, 0x6, 0xf00, 0x2, 0x0, 0x0, 0x0}) 12:46:35 executing program 4: setreuid(0xee00, 0xee01) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0xc0045878, 0x0) 12:46:35 executing program 2: syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x200810, &(0x7f0000000040)={[{@noquota}, {@barrier}, {@nouid32}, {@grpquota}]}, 0x1, 0x4a6, &(0x7f0000000580)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r2 = dup3(r1, r0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) fallocate(r4, 0x0, 0x0, 0x6) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f00000000c0)={0x0, r3}) write$rfkill(r2, &(0x7f0000000000), 0x8) 12:46:35 executing program 3: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r2) fcntl$notify(r0, 0x402, 0x3d) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000080)={0x0, 0x0}) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r4}) readv(r0, 0x0, 0x0) 12:46:35 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x20000) ioctl$TIOCGSERIAL(r0, 0x541e, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=""/170}) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="009527fa378f235099128a634ae1e507e0ce5ae7d2470a6ee7334ebb598e0300"], 0x0, 0x236, &(0x7f0000000300)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)=ANY=[@ANYBLOB="0200000000000000000080000000000000000000004b78a992a829fbb5ddbffda9ca823af700000000400000", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f40"]) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r3, &(0x7f0000000740)='foo', 0x3) syz_open_pts(0xffffffffffffffff, 0x20000) (async) ioctl$TIOCGSERIAL(r0, 0x541e, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=""/170}) (async) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="009527fa378f235099128a634ae1e507e0ce5ae7d2470a6ee7334ebb598e0300"], 0x0, 0x236, &(0x7f0000000300)="$eJzs3TFoM2UcBvDnLomf/b4gVRdBUEFEtFDqJrjURaEgpYgIKlREXJRWqC1urZOLg84qnVyKuFkdpUtxUQSnqh3qImhxsDjoELlcK9VGFFNz8t3vB5fcJe97//e4e95kOS5Aa00nmU/SSTKTpJekON/grnqZPt3cntpfTgaDx38shu3q7dpZv2tJtpI8mGSvLPJiN9nYffro54NH731jvXfPe7tPTU30IE8dHx0+dvLu4usfLjyw8fmX3y8WmU//D8d1+YoRn3WL5Jb/otj/RNFtegT8E0uvfvBVlftbk9w9zH8vZeqT9+baDXu93P/OX/V964cvbp/kWIHLNxj0qt/ArQHQOmWSfopyNkm9Xpazs/V/+K87V8uXVtdemXlhdX3l+aZnKuCy9JPDRz6+8tG1P+X/u06df+D6VeX/iaWdb6r1k07TowEmqcr/zLOb90X+oXXkH9pL/qG95B/aS/6hveQf2kv+ob3kH9pL/qG95B/a63z+AYB2GVxp+g5koClNzz8AAAAAAAAAAAAAAAAAAMBF21P7y2fLpGp++nZy/HCS7qj6neHziJMbh69XfyqqZr8r6m5jeebOMXcwpvcbvvv6pm+brf/ZHc3W31xJtl5LMtftXrz+itPr79+7+W++7z03ZoExPfRks/V/3Wm2/sJB8kk1/8yNmn/K3DZ8Hz3/9KvzN2b9l38ZcwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABMzG8BAAD//8n0bSk=") (async) openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) (async) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)=ANY=[@ANYBLOB="0200000000000000000080000000000000000000004b78a992a829fbb5ddbffda9ca823af700000000400000", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f40"]) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) (async) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) (async) write(r3, &(0x7f0000000740)='foo', 0x3) (async) 12:46:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = syz_open_dev$usbmon(&(0x7f0000000000), 0x3f, 0x10000) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r1, 0x4008941a, &(0x7f0000000040)=0x2) r2 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r3, &(0x7f0000000740)='foo', 0x3) 12:46:35 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000900)=@FILEID_INO32_GEN={0x8}, 0x0) 12:46:35 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000200)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), r2, r0}}, 0x18) 12:46:35 executing program 2: syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x200810, &(0x7f0000000040)={[{@noquota}, {@barrier}, {@nouid32}, {@grpquota}]}, 0x1, 0x4a6, &(0x7f0000000580)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r2 = dup3(r1, r0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) fallocate(r4, 0x0, 0x0, 0x6) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f00000000c0)={0x0, r3}) write$rfkill(r2, &(0x7f0000000000), 0x8) 12:46:35 executing program 4: openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f0000000040)={0x80040, 0x163e}, 0x18) 12:46:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = syz_open_dev$usbmon(&(0x7f0000000000), 0x3f, 0x10000) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r1, 0x4008941a, &(0x7f0000000040)=0x2) r2 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r3, &(0x7f0000000740)='foo', 0x3) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") (async) openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) (async) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) syz_open_dev$usbmon(&(0x7f0000000000), 0x3f, 0x10000) (async) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r1, 0x4008941a, &(0x7f0000000040)=0x2) (async) openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) (async) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) (async) write(r3, &(0x7f0000000740)='foo', 0x3) (async) 12:46:35 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000900)=@FILEID_INO32_GEN={0x8}, 0x0) 12:46:35 executing program 3: syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000240)=ANY=[], 0x21, 0x4a6, &(0x7f0000000a40)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000834c0000000000000000000000000000000000000000000000000000fa0061233d0ab81bd5a272720056b4e048622b460405c6df101e7060be7e57e65fc829944265ea90fb44571f228d0d66423306c12a76b03d75581cee8878a85dc9efd690d18f5b66ee3b0246fa90d286351ab78a77330f7311eebf3849bc278a038b87b58b86c907963b8203b4531b2f2b0e3ffb86af63dcb4171e9b1d114f37b4385c915a4fa0f2bf81860a0df4d37082e98e0a10f49d1d2193d4002bbb5893f6"], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xa, 0x0, &(0x7f00000000c0)) 12:46:42 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_CONTROL(r0, 0xc0105500, &(0x7f0000000040)={0x80, 0x6, 0xf00, 0x2, 0x0, 0x0, 0x0}) 12:46:42 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000480), 0x24, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0) listxattr(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2e) 12:46:42 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002940)={&(0x7f0000000000)=@newtaction={0x50, 0x30, 0x53b, 0x0, 0x0, {0x9}, [{0x3c, 0x1, [@m_vlan={0x38, 0x1, 0x0, 0x0, {{0x9}, {0xc, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x7}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x50}}, 0x0) 12:46:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = syz_open_dev$usbmon(&(0x7f0000000000), 0x3f, 0x10000) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r1, 0x4008941a, &(0x7f0000000040)=0x2) r2 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r3, &(0x7f0000000740)='foo', 0x3) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$eJzs3TFoM2UcBvDnLomf/b4gVRdBUEFEtFDqJrjURaEgpYgIKlREXJRWqC1urZOLg84qnVyKuFkdpUtxUQSnqh3qImhxsDjoELlcK9VGFFNz8t3vB5fcJe97//e4e95kOS5Aa00nmU/SSTKTpJekON/grnqZPt3cntpfTgaDx38shu3q7dpZv2tJtpI8mGSvLPJiN9nYffro54NH731jvXfPe7tPTU30IE8dHx0+dvLu4usfLjyw8fmX3y8WmU//D8d1+YoRn3WL5Jb/otj/RNFtegT8E0uvfvBVlftbk9w9zH8vZeqT9+baDXu93P/OX/V964cvbp/kWIHLNxj0qt/ArQHQOmWSfopyNkm9Xpazs/V/+K87V8uXVtdemXlhdX3l+aZnKuCy9JPDRz6+8tG1P+X/u06df+D6VeX/iaWdb6r1k07TowEmqcr/zLOb90X+oXXkH9pL/qG95B/aS/6hveQf2kv+ob3kH9pL/qG95B/a63z+AYB2GVxp+g5koClNzz8AAAAAAAAAAAAAAAAAAMBF21P7y2fLpGp++nZy/HCS7qj6neHziJMbh69XfyqqZr8r6m5jeebOMXcwpvcbvvv6pm+brf/ZHc3W31xJtl5LMtftXrz+itPr79+7+W++7z03ZoExPfRks/V/3Wm2/sJB8kk1/8yNmn/K3DZ8Hz3/9KvzN2b9l38ZcwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABMzG8BAAD//8n0bSk=") (async) openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) (async) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) syz_open_dev$usbmon(&(0x7f0000000000), 0x3f, 0x10000) (async) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r1, 0x4008941a, &(0x7f0000000040)=0x2) (async) openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) (async) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) (async) write(r3, &(0x7f0000000740)='foo', 0x3) (async) 12:46:42 executing program 2: syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x200810, &(0x7f0000000040)={[{@noquota}, {@barrier}, {@nouid32}, {@grpquota}]}, 0x1, 0x4a6, &(0x7f0000000580)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r2 = dup3(r1, r0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) fallocate(r4, 0x0, 0x0, 0x6) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f00000000c0)={0x0, r3}) write$rfkill(r2, &(0x7f0000000000), 0x8) 12:46:42 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000900)=@FILEID_INO32_GEN={0x8}, 0x0) 12:46:42 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000900)=@FILEID_INO32_GEN={0x8}, 0x0) 12:46:42 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000080)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x4a}, [@ldst={0x6, 0x0, 0x5}], {0x95, 0x25}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x366, 0x10, &(0x7f0000000000), 0x2b2}, 0x48) 12:46:42 executing program 4: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)) pipe(&(0x7f0000000040)) 12:46:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="05"], 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, 'mnt/encrypted_dir/file\x00'}) ftruncate(r1, 0x74f3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x38) write(r3, &(0x7f0000000740)='foo', 0x3) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r4, r0, 0x0, 0x6) 12:46:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x9, 0x8003, 0x20, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000080), 0x20000000}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, &(0x7f0000000100), &(0x7f0000000240)=""/201}, 0x20) 12:46:42 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xa, 0x1, 0xf8a, 0x4}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0), 0x7fff, r0}, 0x38) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000640)={r0, &(0x7f0000000580), &(0x7f0000001bc0)=""/4096}, 0x20) 12:46:42 executing program 0: r0 = socket$inet(0x2, 0x6000000000000001, 0x0) mmap(&(0x7f0000001000/0x200000)=nil, 0x200000, 0x2000001, 0x2011, r0, 0x0) socket(0x10, 0x0, 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46002) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) io_setup(0x1, &(0x7f0000000180)=0x0) io_submit(r2, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x101010, 0x400000000000, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 12:46:48 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_CONTROL(r0, 0xc0105500, &(0x7f0000000040)={0x80, 0x6, 0xf00, 0x2, 0x0, 0x0, 0x0}) 12:46:48 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r2 = socket$inet(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x3e8, 0x100, 0x100, 0x100, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 12:46:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="05"], 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, 'mnt/encrypted_dir/file\x00'}) ftruncate(r1, 0x74f3) (async) ftruncate(r1, 0x74f3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x38) write(r3, &(0x7f0000000740)='foo', 0x3) socket$nl_xfrm(0x10, 0x3, 0x6) (async) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r4, r0, 0x0, 0x6) 12:46:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=ANY=[@ANYBLOB="780000002400518600"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100736671"], 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000a80)=ANY=[@ANYBLOB='l\x00\x00\x00,\x00\'\r\x00'/20, @ANYRES32=r4, @ANYBLOB="00000000000000000d0000000a00010062617369630000003c0002003800028008000100ffff00002c00028010000100000002000000000000000000180002"], 0x6c}}, 0x0) 12:46:48 executing program 0: mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000000), 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0) 12:46:48 executing program 3: setpgid(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0\x00', 0x100}) r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000012c0)={@qipcrtr={0x2a, 0x4, 0x2}, {&(0x7f0000001200)=""/115, 0x73}, &(0x7f0000001280), 0xb}, 0xa0) r1 = getpid() prlimit64(r1, 0x0, &(0x7f0000000000), &(0x7f0000000040)) rt_tgsigqueueinfo(0x0, r1, 0x4, &(0x7f00000016c0)={0x1f, 0x3f, 0x3}) r2 = getpid() r3 = getpid() prlimit64(r3, 0x0, &(0x7f0000000000), &(0x7f0000000040)) rt_tgsigqueueinfo(r2, r3, 0x3f, &(0x7f0000001740)={0x1c, 0x7, 0x300000}) r4 = syz_clone(0x910c000, &(0x7f00000000c0)="f91dd1fb76d9fde7b4aefe7ba30e1008618b880ddf16b774e656c92429ce33c4ca7d097c37478e36fd6d7cdbc39163c8dc9112124377605c8cf4b6a263e499076d1729594b6a57ca4b4ee86c43ca60579fcf0010c8d5cd990bc359dd424f00738c27b2c0557179585ce18f620881f9c067d3763cfbac3fdf5f2ebe4efdf5affaf8386a0861fc5f9ae15b05380cd86e46650953d514884c7bc6434800b4ba", 0x9e, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="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") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000001380)={r0}) setpgid(r4, r2) r5 = getpid() setpgid(r5, 0x0) syz_clone(0x88000000, &(0x7f00000013c0)="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", 0xfe, &(0x7f00000014c0), &(0x7f0000001500), &(0x7f00000018c0)="cb16e6c0e4c9094d7fa40d481559209f471eb0e8a12979be79d1c430606d6ca7ec0c9a2e55eeb116e1d99c9d747753428f2af501454b97c92d1ff03f4376f8dc4e4dafeb68e35a87dd919c167977fa29fd7fee5817a07b27a802e8b873d69eb332de5e62536a3814ca05f3cb277da9120e3a3c8c1b7ad4b2ef5cceef6c0a615b9906f9e050f394567cf44bbd0978646acbf8c19da893c2091262656f64b1ee7f4aa2b2348bd9e14adc8cb588bcb6778981e934227ef5a6a676ebbaaa58a37555d8951ebd5de699a2dc4e2672386518457f72d4eef4b8d478b4332541706ca25f210c9ae57e4cef475f643e06adec97ca212e7e5ae4978d3146510ac72b73c2d06610f52ab8e6808c377e9fa589cb99cd2fa69ed942b60820f750ddbc5f399aac63d3683756b0294c9e7e8ea10e250c268b781cf49d9d4cae6ecff29645fb212750e3e758f4706a750090011b970fc39a11d2df7cf3e9c58ab1cc9de102dbb458e3248cb2269dd680f8683563c34fd868d2d5129bec2c2f7ae8c0dabb0375a16d98930d0621aad5ff260196feb1c045bd712ff2") waitid(0x2, r5, 0x0, 0x4, 0x0) prlimit64(r2, 0xe, &(0x7f0000000080)={0x8000000000000000, 0xff}, 0x0) 12:46:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x1e, &(0x7f0000000200)=ANY=[@ANYRES16=0x0, @ANYRESDEC], 0x2, 0x425, &(0x7f00000004c0)="$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") perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000ac0), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="01000000d7fe63dfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="4ebb440701"], 0x20000600}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = open(&(0x7f0000000300)='./bus\x00', 0x143042, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000a40)={'ip6tnl0\x00', {0x2, 0x0, @loopback}}) ftruncate(r4, 0x2006fff) close(r3) open(&(0x7f00000002c0)='./bus\x00', 0x4c842, 0x0) sendfile(r3, r3, 0x0, 0x205000) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x4000884) r5 = socket$inet6(0xa, 0x3, 0x6) sendfile(r5, 0xffffffffffffffff, &(0x7f0000000240), 0x9) sendmsg$NLBL_UNLABEL_C_LIST(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0xc104a010}, 0xc, &(0x7f0000000580)={&(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x4c}, 0x1, 0x0, 0x0, 0x4044040}, 0x0) 12:46:48 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r2 = socket$inet(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x3e8, 0x100, 0x100, 0x100, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 12:46:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="05"], 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, 'mnt/encrypted_dir/file\x00'}) ftruncate(r1, 0x74f3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) r3 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x38) write(r3, &(0x7f0000000740)='foo', 0x3) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r4, r0, 0x0, 0x6) 12:46:48 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$eJzs3TFoM2UcBvDnLomf/b4gVRdBUEFEtFDqJrjURaEgpYgIKlREXJRWqC1urZOLg84qnVyKuFkdpUtxUQSnqh3qImhxsDjoELlcK9VGFFNz8t3vB5fcJe97//e4e95kOS5Aa00nmU/SSTKTpJekON/grnqZPt3cntpfTgaDx38shu3q7dpZv2tJtpI8mGSvLPJiN9nYffro54NH731jvXfPe7tPTU30IE8dHx0+dvLu4usfLjyw8fmX3y8WmU//D8d1+YoRn3WL5Jb/otj/RNFtegT8E0uvfvBVlftbk9w9zH8vZeqT9+baDXu93P/OX/V964cvbp/kWIHLNxj0qt/ArQHQOmWSfopyNkm9Xpazs/V/+K87V8uXVtdemXlhdX3l+aZnKuCy9JPDRz6+8tG1P+X/u06df+D6VeX/iaWdb6r1k07TowEmqcr/zLOb90X+oXXkH9pL/qG95B/aS/6hveQf2kv+ob3kH9pL/qG95B/a63z+AYB2GVxp+g5koClNzz8AAAAAAAAAAAAAAAAAAMBF21P7y2fLpGp++nZy/HCS7qj6neHziJMbh69XfyqqZr8r6m5jeebOMXcwpvcbvvv6pm+brf/ZHc3W31xJtl5LMtftXrz+itPr79+7+W++7z03ZoExPfRks/V/3Wm2/sJB8kk1/8yNmn/K3DZ8Hz3/9KvzN2b9l38ZcwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABMzG8BAAD//8n0bSk=") r1 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) r2 = open$dir(&(0x7f0000000040)='mnt/encrypted_dir/file\x00', 0x44440, 0xf0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000080)={0xc8, 0x401, 0xffff6f3d, 0x10000, 0x77}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000380)=0x20) ioctl$FS_IOC_SETFLAGS(r4, 0x6611, 0x0) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x2b2601, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r6 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r6, &(0x7f0000000740)='foo', 0x3) 12:46:48 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r2 = socket$inet(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x3e8, 0x100, 0x100, 0x100, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) [ 2942.462690][ T3013] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2942.498871][ T3013] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 12:46:48 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r2 = socket$inet(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x3e8, 0x100, 0x100, 0x100, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) [ 2942.635630][ T3036] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.2'. 12:46:52 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_CONTROL(r0, 0xc0105500, &(0x7f0000000040)={0x80, 0x6, 0xf00, 0x2, 0x0, 0x0, 0x0}) 12:46:52 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) syz_emit_ethernet(0x82, &(0x7f0000000040)={@empty, @local, @val={@void}, {@ipv6={0x86dd, @generic={0x0, 0x6, '\x00', 0x48, 0x2f, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}, @mcast1, {[@srh={0x0, 0x8, 0x4, 0x4, 0x0, 0x0, 0x0, [@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private0]}]}}}}}, 0x0) 12:46:52 executing program 3: perf_event_open$cgroup(&(0x7f0000000800)={0x0, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:46:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x4}, @TIPC_NLA_NET={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc}]}]}, 0x3c}}, 0x0) 12:46:52 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$eJzs3TFoM2UcBvDnLomf/b4gVRdBUEFEtFDqJrjURaEgpYgIKlREXJRWqC1urZOLg84qnVyKuFkdpUtxUQSnqh3qImhxsDjoELlcK9VGFFNz8t3vB5fcJe97//e4e95kOS5Aa00nmU/SSTKTpJekON/grnqZPt3cntpfTgaDx38shu3q7dpZv2tJtpI8mGSvLPJiN9nYffro54NH731jvXfPe7tPTU30IE8dHx0+dvLu4usfLjyw8fmX3y8WmU//D8d1+YoRn3WL5Jb/otj/RNFtegT8E0uvfvBVlftbk9w9zH8vZeqT9+baDXu93P/OX/V964cvbp/kWIHLNxj0qt/ArQHQOmWSfopyNkm9Xpazs/V/+K87V8uXVtdemXlhdX3l+aZnKuCy9JPDRz6+8tG1P+X/u06df+D6VeX/iaWdb6r1k07TowEmqcr/zLOb90X+oXXkH9pL/qG95B/aS/6hveQf2kv+ob3kH9pL/qG95B/a63z+AYB2GVxp+g5koClNzz8AAAAAAAAAAAAAAAAAAMBF21P7y2fLpGp++nZy/HCS7qj6neHziJMbh69XfyqqZr8r6m5jeebOMXcwpvcbvvv6pm+brf/ZHc3W31xJtl5LMtftXrz+itPr79+7+W++7z03ZoExPfRks/V/3Wm2/sJB8kk1/8yNmn/K3DZ8Hz3/9KvzN2b9l38ZcwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABMzG8BAAD//8n0bSk=") (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) (async) r2 = open$dir(&(0x7f0000000040)='mnt/encrypted_dir/file\x00', 0x44440, 0xf0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000080)={0xc8, 0x401, 0xffff6f3d, 0x10000, 0x77}) (async) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000380)=0x20) (async) ioctl$FS_IOC_SETFLAGS(r4, 0x6611, 0x0) (async) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x2b2601, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r6 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r6, &(0x7f0000000740)='foo', 0x3) 12:46:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x1e, &(0x7f0000000200)=ANY=[@ANYRES16=0x0, @ANYRESDEC], 0x2, 0x425, &(0x7f00000004c0)="$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") perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000ac0), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="01000000d7fe63dfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="4ebb440701"], 0x20000600}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = open(&(0x7f0000000300)='./bus\x00', 0x143042, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000a40)={'ip6tnl0\x00', {0x2, 0x0, @loopback}}) ftruncate(r4, 0x2006fff) close(r3) open(&(0x7f00000002c0)='./bus\x00', 0x4c842, 0x0) sendfile(r3, r3, 0x0, 0x205000) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x4000884) r5 = socket$inet6(0xa, 0x3, 0x6) sendfile(r5, 0xffffffffffffffff, &(0x7f0000000240), 0x9) sendmsg$NLBL_UNLABEL_C_LIST(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0xc104a010}, 0xc, &(0x7f0000000580)={&(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x4c}, 0x1, 0x0, 0x0, 0x4044040}, 0x0) 12:46:52 executing program 2: syz_mount_image$vfat(&(0x7f0000000100), &(0x7f0000000000)='./file0\x00', 0x2200082, &(0x7f00000003c0)=ANY=[@ANYBLOB="757466383d302c696f636861727365743d6d6163677265656b2c636865636b3d7374726963742c757466383d312c696f636861727365743d64656661756c742c646f733178666c6f7070792c757466383d302c726f6469722c6e6f6e756d7461696c3d302c73686f72746e616d653d6c6f7765722c004824fd35e13da4a608110f4e018909a9390a36dff51ba0d6ad2725fa6f7b5f7cc2f3a838f2bed1e3244e10eeeef6c4bff8de08a70cbed6b86fabb7d93bec6c99f0b45c748ea7944b76409398a8bc40b56f0940124ebf5798c597235b8960a9e3fa97eb2049fc05e6a15f9064866d5e88477e0de45deb2dda80a4b04cdac31c30c07974074e2c8f6677a4a0ecc654a733653e1b14b5f0a81c614d70b77b1c3e5be1736d5e31be17451656535277f2b4cfbfdc94dd17c0bba59b5e8cbdc845fad0520a881e068b17ca98dd183d"], 0x1, 0x293, &(0x7f0000000780)="$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") open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 12:46:52 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) r2 = open$dir(&(0x7f0000000040)='mnt/encrypted_dir/file\x00', 0x44440, 0xf0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000080)={0xc8, 0x401, 0xffff6f3d, 0x10000, 0x77}) (async) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) r3 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000380)=0x20) ioctl$FS_IOC_SETFLAGS(r4, 0x6611, 0x0) (async) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x2b2601, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) r6 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r6, &(0x7f0000000740)='foo', 0x3) 12:46:52 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) syz_emit_ethernet(0x82, &(0x7f0000000040)={@empty, @local, @val={@void}, {@ipv6={0x86dd, @generic={0x0, 0x6, '\x00', 0x48, 0x2f, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}, @mcast1, {[@srh={0x0, 0x8, 0x4, 0x4, 0x0, 0x0, 0x0, [@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private0]}]}}}}}, 0x0) 12:46:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = memfd_create(&(0x7f0000000300)='\x00\xc2\xea\x99\xbb\x1c\xdfjw\x97\x05\xa3\xa2\'\xdd\xe4q\xbf\t\x8c\xe0\x19`\x8e\x00\x00\x00\x00\x00\x00\x00\x00\x00\b \xff\x13\x96\xe3?\xdfH\x8c\xe4V\xe2\xfe\v8\x04\xa5\xb9\xc4:\xf3\xf6y_w\xd8\xcf\x90k\x05\x00\xf9\x1e\xe8m\xec\x12\xa015\xc2\xb3u|K\x111\xd4\f8\xeb\x18\xad\xbb!1\x85\x96P\x1b\xa1\x9a\x81\xf8\xb1\xecB)\xe5\xaa7\xfe\xdd,_D\xe5|\xb1j^\xaec}\x1a\xb4\x17\xafP\x85I\xd5\xa0I\xb0\xaf\xb5\x8b\\\x05\xd7g\xcbV\x8e\xd0\xac\x87I7\xbd\xc6\x9bI\x92\xb2\x87.\xb3\x1fs\xe7%\xdd+\r\xb4\x117\xa7ei~\xb8\x16\xd1P\xf2\x84\x89K\x16\xd0F|\xa3\x89\xc9~9\x00'/204, 0x7) fchown(r4, r1, r3) 12:46:52 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) syz_emit_ethernet(0x82, &(0x7f0000000040)={@empty, @local, @val={@void}, {@ipv6={0x86dd, @generic={0x0, 0x6, '\x00', 0x48, 0x2f, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}, @mcast1, {[@srh={0x0, 0x8, 0x4, 0x4, 0x0, 0x0, 0x0, [@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private0]}]}}}}}, 0x0) 12:46:52 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) syz_emit_ethernet(0x82, &(0x7f0000000040)={@empty, @local, @val={@void}, {@ipv6={0x86dd, @generic={0x0, 0x6, '\x00', 0x48, 0x2f, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}, @mcast1, {[@srh={0x0, 0x8, 0x4, 0x4, 0x0, 0x0, 0x0, [@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private0]}]}}}}}, 0x0) 12:46:52 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x4, 0x92, &(0x7f0000000640)=""/146, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000380)={0x0, {{0x2, 0x0, @empty}}, 0x0, 0x1, [{{0x2, 0x0, @private}}]}, 0x110) 12:46:58 executing program 4: r0 = semget$private(0x0, 0x4000000009, 0x0) semop(r0, &(0x7f0000000240)=[{0x2, 0x7fff, 0x1000}], 0x1) semop(r0, &(0x7f0000000100)=[{0x2, 0xd5db}], 0x1) semop(r0, &(0x7f0000000080)=[{0x2, 0x7, 0x1800}], 0x1) 12:46:58 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r1) sendmsg$NFC_CMD_DEV_UP(r1, 0x0, 0x0) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) dup2(r2, r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 12:46:58 executing program 2: socket$phonet_pipe(0x23, 0x5, 0x2) unshare(0x600) pselect6(0x40, &(0x7f0000000500), &(0x7f00000000c0)={0x3}, &(0x7f0000000580)={0x8}, 0x0, 0x0) 12:46:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000040000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000102030405060708090a0b0c0d0eccd67d7d070dac551718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f40"]) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) ptrace(0x10, 0x0) ptrace$setopts(0x4200, 0x0, 0x0, 0x80000) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000000)={0x2, 0x4, 0x8}) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x20, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_PID={0x8}, @NL80211_ATTR_NETNS_FD={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x810}, 0x4000) r3 = socket(0x10, 0x3, 0x0) bind$netlink(r3, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r3, &(0x7f0000000140)="2600000022004701050000070000000000000020002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r3, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r3, &(0x7f0000000000)='\"', 0x1) recvmmsg(r3, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) sendmsg$NFT_MSG_GETOBJ(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c000000130a0104000000064000000000000000020c0006400000000000000002"], 0x2c}, 0x1, 0x0, 0x0, 0x4000c080}, 0x40000) recvmmsg(r3, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r4) ptrace$setopts(0x4200, r4, 0x0, 0x80000) fcntl$lock(r3, 0x26, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x0, r4}) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x20, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r4}, @NL80211_ATTR_NETNS_FD={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x810}, 0x4000) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)={0x0, 0x0}) r6 = fcntl$getown(r2, 0x9) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001780), 0x400202, 0x0) syz_clone3(&(0x7f00000017c0)={0x46000100, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x15}, &(0x7f00000000c0)=""/214, 0xd6, &(0x7f0000000780)=""/4096, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, r4, r5, r6], 0x8, {r7}}, 0x58) write(r2, &(0x7f0000000740)='foo', 0x3) 12:46:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x1e, &(0x7f0000000200)=ANY=[@ANYRES16=0x0, @ANYRESDEC], 0x2, 0x425, &(0x7f00000004c0)="$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") perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000ac0), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="01000000d7fe63dfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="4ebb440701"], 0x20000600}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = open(&(0x7f0000000300)='./bus\x00', 0x143042, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000a40)={'ip6tnl0\x00', {0x2, 0x0, @loopback}}) ftruncate(r4, 0x2006fff) close(r3) open(&(0x7f00000002c0)='./bus\x00', 0x4c842, 0x0) sendfile(r3, r3, 0x0, 0x205000) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x4000884) r5 = socket$inet6(0xa, 0x3, 0x6) sendfile(r5, 0xffffffffffffffff, &(0x7f0000000240), 0x9) sendmsg$NLBL_UNLABEL_C_LIST(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0xc104a010}, 0xc, &(0x7f0000000580)={&(0x7f0000000b00)=ANY=[@ANYBLOB="96c8e84d0a45ab3e3c49439214e0d083dc46dd9b02dfc1d073025ab30bdde15619d27f220bb137fdece24beab5c0bb469401ce6d2f002038caf6d0f5e2ac3b32cca553c3fbf2e45a6f248aa04a3ea774328d30cad068ef2eb4ffd1735f8c83dcda8dd743bce9d73704f3a2b14e20af423046f9ed29f23723591955da469bbc4a01b2b9111e8cd57abf84fa96c733ed7dc75551b2dee3818f6477d69476a05283dc6169d088e4b072b236c073c9aca6224c60806024a73d2aa2c46e97c298f8578804dc72af0bf45d81852be802abe7f205ea4fc2514f3bb231b6e81d025214dbaa2a718ae52a72038a96ca55cdd5a8e7841051f6942fcb64d97d2a4a50f64dd3d41a942f44c8804e0de09c0372864d614828dbd6207785fc4eda93370c60759f7ce69a1cf7050dfac982e4019ca30c4c0e4a847e64674e9011e7211e28c63fd43b0defc73ddb25b7"], 0x4c}, 0x1, 0x0, 0x0, 0x4044040}, 0x0) 12:46:58 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x145842, 0x0) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x307e00}], 0x1, 0x1400, 0x0, 0x3) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x4003fa) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x14b042, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x163042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000080)={0x6, r3}) lseek(r0, 0x0, 0x3) creat(&(0x7f0000000180)='./file0\x00', 0x0) 12:46:58 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) mq_getsetattr(0xffffffffffffffff, 0x0, 0x0) 12:46:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8947, &(0x7f0000000100)={'macvlan0\x00', @ifru_settings={0x0, 0x0, @te1=0x0}}) 12:46:58 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0xfffffffffffffffb, 0x400) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_key={0x2, 0x9, 0x8, 0x0, ':'}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x60}, 0x1, 0x7}, 0x0) 12:46:58 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r0, 0xffffffffffffffff, 0x0) 12:46:58 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0xe1f, 0x101302) r1 = dup2(r0, r0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x11, r1, 0x0) 12:46:58 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000500)=""/4096, 0x1000}], 0x1, 0x79, 0x0) 12:46:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x1e, &(0x7f0000000200)=ANY=[@ANYRES16=0x0, @ANYRESDEC], 0x2, 0x425, &(0x7f00000004c0)="$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") perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000ac0), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="01000000d7fe63dfc0d1629edc3ff3fc", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="4ebb440701"], 0x20000600}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = open(&(0x7f0000000300)='./bus\x00', 0x143042, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000a40)={'ip6tnl0\x00', {0x2, 0x0, @loopback}}) ftruncate(r4, 0x2006fff) close(r3) open(&(0x7f00000002c0)='./bus\x00', 0x4c842, 0x0) sendfile(r3, r3, 0x0, 0x205000) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x4000884) r5 = socket$inet6(0xa, 0x3, 0x6) sendfile(r5, 0xffffffffffffffff, &(0x7f0000000240), 0x9) sendmsg$NLBL_UNLABEL_C_LIST(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0xc104a010}, 0xc, &(0x7f0000000580)={&(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x4c}, 0x1, 0x0, 0x0, 0x4044040}, 0x0) [ 2952.924422][ T3105] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2579 sclass=netlink_route_socket pid=3105 comm=syz-executor.5 12:46:58 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000031c0)=[{{&(0x7f0000000180)={0xa, 0x4e21, 0x0, @mcast1={0xff, 0x2}, 0x37}, 0x1c, 0x0}}], 0x1, 0x0) 12:46:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@ipv4_newaddr={0x18}, 0x18}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4c00000024001d0f00"/20, @ANYRES32=r4, @ANYBLOB="0000ffffffffffffffff00000a0001006e6574656d0000001c0002"], 0x4c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000a00)=@newqdisc={0x24, 0x24, 0xd15, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xffff}}}, 0x24}}, 0x0) [ 2952.998589][ T3126] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 12:46:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") (async) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$eJzs3TFoM2UcBvDnLomf/b4gVRdBUEFEtFDqJrjURaEgpYgIKlREXJRWqC1urZOLg84qnVyKuFkdpUtxUQSnqh3qImhxsDjoELlcK9VGFFNz8t3vB5fcJe97//e4e95kOS5Aa00nmU/SSTKTpJekON/grnqZPt3cntpfTgaDx38shu3q7dpZv2tJtpI8mGSvLPJiN9nYffro54NH731jvXfPe7tPTU30IE8dHx0+dvLu4usfLjyw8fmX3y8WmU//D8d1+YoRn3WL5Jb/otj/RNFtegT8E0uvfvBVlftbk9w9zH8vZeqT9+baDXu93P/OX/V964cvbp/kWIHLNxj0qt/ArQHQOmWSfopyNkm9Xpazs/V/+K87V8uXVtdemXlhdX3l+aZnKuCy9JPDRz6+8tG1P+X/u06df+D6VeX/iaWdb6r1k07TowEmqcr/zLOb90X+oXXkH9pL/qG95B/aS/6hveQf2kv+ob3kH9pL/qG95B/a63z+AYB2GVxp+g5koClNzz8AAAAAAAAAAAAAAAAAAMBF21P7y2fLpGp++nZy/HCS7qj6neHziJMbh69XfyqqZr8r6m5jeebOMXcwpvcbvvv6pm+brf/ZHc3W31xJtl5LMtftXrz+itPr79+7+W++7z03ZoExPfRks/V/3Wm2/sJB8kk1/8yNmn/K3DZ8Hz3/9KvzN2b9l38ZcwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABMzG8BAAD//8n0bSk=") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000040000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000102030405060708090a0b0c0d0eccd67d7d070dac551718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f40"]) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) ptrace(0x10, 0x0) (async) ptrace(0x10, 0x0) ptrace$setopts(0x4200, 0x0, 0x0, 0x80000) (async) ptrace$setopts(0x4200, 0x0, 0x0, 0x80000) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000000)={0x2, 0x4, 0x8}) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x20, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_PID={0x8}, @NL80211_ATTR_NETNS_FD={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x810}, 0x4000) socket(0x10, 0x3, 0x0) (async) r3 = socket(0x10, 0x3, 0x0) bind$netlink(r3, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r3, &(0x7f0000000140)="2600000022004701050000070000000000000020002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r3, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) (async) connect$netlink(r3, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) (async) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r3, &(0x7f0000000000)='\"', 0x1) recvmmsg(r3, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) sendmsg$NFT_MSG_GETOBJ(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c000000130a0104000000064000000000000000020c0006400000000000000002"], 0x2c}, 0x1, 0x0, 0x0, 0x4000c080}, 0x40000) (async) sendmsg$NFT_MSG_GETOBJ(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c000000130a0104000000064000000000000000020c0006400000000000000002"], 0x2c}, 0x1, 0x0, 0x0, 0x4000c080}, 0x40000) recvmmsg(r3, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r4) ptrace$setopts(0x4200, r4, 0x0, 0x80000) fcntl$lock(r3, 0x26, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x0, r4}) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x20, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r4}, @NL80211_ATTR_NETNS_FD={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x810}, 0x4000) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)) (async) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)={0x0, 0x0}) fcntl$getown(r2, 0x9) (async) r6 = fcntl$getown(r2, 0x9) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001780), 0x400202, 0x0) syz_clone3(&(0x7f00000017c0)={0x46000100, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x15}, &(0x7f00000000c0)=""/214, 0xd6, &(0x7f0000000780)=""/4096, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, r4, r5, r6], 0x8, {r7}}, 0x58) write(r2, &(0x7f0000000740)='foo', 0x3) (async) write(r2, &(0x7f0000000740)='foo', 0x3) 12:46:59 executing program 4: perf_event_open(&(0x7f0000000000)={0xb, 0x80, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x19) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000000c0)="5c00000012006bcd9e", 0x33fe0}], 0x1}, 0x0) [ 2953.762427][ T3136] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2579 sclass=netlink_route_socket pid=3136 comm=syz-executor.5 [ 2953.775664][ T3139] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2579 sclass=netlink_route_socket pid=3139 comm=syz-executor.5 12:47:03 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x3, 0x9, 0x7ff, 0x100}, 0x20) 12:47:03 executing program 3: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000b28000)=0x3e) recvmmsg(r2, &(0x7f0000001d40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) dup2(r1, r2) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 12:47:03 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r0, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) r1 = epoll_create(0x20000001) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000440)={0xe0000013}) shutdown(r0, 0x0) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 12:47:03 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000f00)={&(0x7f0000000dc0), 0xc, &(0x7f0000000ec0)={0x0}}, 0x0) sendmsg$key(r0, 0x0, 0x4000805) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 12:47:03 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x145842, 0x0) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x307e00}], 0x1, 0x1400, 0x0, 0x3) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x4003fa) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x14b042, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x163042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000080)={0x6, r3}) lseek(r0, 0x0, 0x3) creat(&(0x7f0000000180)='./file0\x00', 0x0) 12:47:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) (async) r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000040000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000102030405060708090a0b0c0d0eccd67d7d070dac551718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f40"]) (async) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000040000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000102030405060708090a0b0c0d0eccd67d7d070dac551718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f40"]) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) (async) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) ptrace(0x10, 0x0) ptrace$setopts(0x4200, 0x0, 0x0, 0x80000) (async) ptrace$setopts(0x4200, 0x0, 0x0, 0x80000) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000000)={0x2, 0x4, 0x8}) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x20, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_PID={0x8}, @NL80211_ATTR_NETNS_FD={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x810}, 0x4000) r3 = socket(0x10, 0x3, 0x0) bind$netlink(r3, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r3, &(0x7f0000000140)="2600000022004701050000070000000000000020002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) (async) write(r3, &(0x7f0000000140)="2600000022004701050000070000000000000020002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r3, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) (async) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r3, &(0x7f0000000000)='\"', 0x1) recvmmsg(r3, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) (async) recvmmsg(r3, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) sendmsg$NFT_MSG_GETOBJ(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c000000130a0104000000064000000000000000020c0006400000000000000002"], 0x2c}, 0x1, 0x0, 0x0, 0x4000c080}, 0x40000) recvmmsg(r3, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r4) ptrace$setopts(0x4200, r4, 0x0, 0x80000) fcntl$lock(r3, 0x26, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x0, r4}) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x20, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r4}, @NL80211_ATTR_NETNS_FD={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x810}, 0x4000) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)={0x0, 0x0}) r6 = fcntl$getown(r2, 0x9) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001780), 0x400202, 0x0) syz_clone3(&(0x7f00000017c0)={0x46000100, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x15}, &(0x7f00000000c0)=""/214, 0xd6, &(0x7f0000000780)=""/4096, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, r4, r5, r6], 0x8, {r7}}, 0x58) write(r2, &(0x7f0000000740)='foo', 0x3) (async) write(r2, &(0x7f0000000740)='foo', 0x3) 12:47:03 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000540)='net/fib_trie\x00') preadv(r3, &(0x7f0000000000)=[{&(0x7f0000000080)=""/131, 0x83}], 0x1, 0x20000004, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000780), 0xffffffffffffffff) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@loopback}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000004c0)={&(0x7f0000000a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="01002bbd7000fddbdf2501000000080001", @ANYBLOB="3c01028040000100", @ANYRES32, @ANYRESDEC=r0, @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000513030003000000080004000006000008000100", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e0000080001", @ANYRES64, @ANYRES64, @ANYBLOB="040002"], 0x274}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) [ 2958.090488][ T3159] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2579 sclass=netlink_route_socket pid=3159 comm=syz-executor.5 12:47:03 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000850000005000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) flock(r2, 0x2) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) recvmsg(r4, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x40000110) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="4000000010001fff000000000000f4f309000000", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172530000000381028008000a00", @ANYRESDEC=r4], 0x40}, 0x1, 0x0, 0x0, 0x20040810}, 0x0) flock(r3, 0x1) r5 = creat(&(0x7f0000000180)='./file0\x00', 0x0) flock(r5, 0x2) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) lseek(r6, 0x0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', r6}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r8 = getpid() sched_setscheduler(r8, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$unix(r9, &(0x7f0000000180)=@abs, 0x6e) recvmmsg(r9, &(0x7f00000000c0), 0x10106, 0x2, 0x0) lseek(r7, 0x0, 0x1) readv(r7, &(0x7f0000000c80)=[{&(0x7f0000000840)=""/62, 0x3e}], 0x1) close_range(r1, 0xffffffffffffffff, 0x0) 12:47:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='mnt/encrypted_dir\x00', 0x400, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000040000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000ea58000000000000000000000000000000000000000000000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f40"]) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000380)=0x20) ioctl$FS_IOC_SETFLAGS(r1, 0x6611, 0x0) getdents(r1, &(0x7f0000000000)=""/96, 0x60) r2 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r3, &(0x7f0000000740)='foo', 0x3) 12:47:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='mnt/encrypted_dir\x00', 0x400, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000040000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000ea58000000000000000000000000000000000000000000000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f40"]) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000380)=0x20) (async) ioctl$FS_IOC_SETFLAGS(r1, 0x6611, 0x0) (async) getdents(r1, &(0x7f0000000000)=""/96, 0x60) (async) r2 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) r3 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r3, &(0x7f0000000740)='foo', 0x3) [ 2958.170799][ T3177] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 12:47:04 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000850000005000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) flock(r2, 0x2) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) recvmsg(r4, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x40000110) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="4000000010001fff000000000000f4f309000000", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172530000000381028008000a00", @ANYRESDEC=r4], 0x40}, 0x1, 0x0, 0x0, 0x20040810}, 0x0) flock(r3, 0x1) r5 = creat(&(0x7f0000000180)='./file0\x00', 0x0) flock(r5, 0x2) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) lseek(r6, 0x0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', r6}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r8 = getpid() sched_setscheduler(r8, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$unix(r9, &(0x7f0000000180)=@abs, 0x6e) recvmmsg(r9, &(0x7f00000000c0), 0x10106, 0x2, 0x0) lseek(r7, 0x0, 0x1) readv(r7, &(0x7f0000000c80)=[{&(0x7f0000000840)=""/62, 0x3e}], 0x1) close_range(r1, 0xffffffffffffffff, 0x0) 12:47:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='mnt/encrypted_dir\x00', 0x400, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000040000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000ea58000000000000000000000000000000000000000000000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f40"]) (async, rerun: 32) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async, rerun: 32) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000380)=0x20) (async, rerun: 64) ioctl$FS_IOC_SETFLAGS(r1, 0x6611, 0x0) (async, rerun: 64) getdents(r1, &(0x7f0000000000)=""/96, 0x60) r2 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) r3 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r3, &(0x7f0000000740)='foo', 0x3) 12:47:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='@'], 0x0, 0x236, &(0x7f0000000300)="$eJzs3TFoM2UcBvDnLomf/b4gVRdBUEFEtFDqJrjURaEgpYgIKlREXJRWqC1urZOLg84qnVyKuFkdpUtxUQSnqh3qImhxsDjoELlcK9VGFFNz8t3vB5fcJe97//e4e95kOS5Aa00nmU/SSTKTpJekON/grnqZPt3cntpfTgaDx38shu3q7dpZv2tJtpI8mGSvLPJiN9nYffro54NH731jvXfPe7tPTU30IE8dHx0+dvLu4usfLjyw8fmX3y8WmU//D8d1+YoRn3WL5Jb/otj/RNFtegT8E0uvfvBVlftbk9w9zH8vZeqT9+baDXu93P/OX/V964cvbp/kWIHLNxj0qt/ArQHQOmWSfopyNkm9Xpazs/V/+K87V8uXVtdemXlhdX3l+aZnKuCy9JPDRz6+8tG1P+X/u06df+D6VeX/iaWdb6r1k07TowEmqcr/zLOb90X+oXXkH9pL/qG95B/aS/6hveQf2kv+ob3kH9pL/qG95B/a63z+AYB2GVxp+g5koClNzz8AAAAAAAAAAAAAAAAAAMBF21P7y2fLpGp++nZy/HCS7qj6neHziJMbh69XfyqqZr8r6m5jeebOMXcwpvcbvvv6pm+brf/ZHc3W31xJtl5LMtftXrz+itPr79+7+W++7z03ZoExPfRks/V/3Wm2/sJB8kk1/8yNmn/K3DZ8Hz3/9KvzN2b9l38ZcwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABMzG8BAAD//8n0bSk=") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) mount$9p_unix(&(0x7f0000000000)='./mnt\x00', &(0x7f0000000040)='./mnt\x00', &(0x7f0000000080), 0x1012, &(0x7f00000000c0)={'trans=unix,', {[{@access_user}, {@msize={'msize', 0x3d, 0x100000001}}, {@aname={'aname', 0x3d, 'ext4\x00'}}, {@version_L}, {@posixacl}], [{@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@uid_lt}]}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) open$dir(&(0x7f00000001c0)='mnt\x00', 0x6102, 0x328) write(r2, &(0x7f0000000740)='foo', 0x3) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180), 0xffffffffffffffff) [ 2958.415807][ T3197] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 12:47:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='@'], 0x0, 0x236, &(0x7f0000000300)="$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") (async) r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async, rerun: 32) mount$9p_unix(&(0x7f0000000000)='./mnt\x00', &(0x7f0000000040)='./mnt\x00', &(0x7f0000000080), 0x1012, &(0x7f00000000c0)={'trans=unix,', {[{@access_user}, {@msize={'msize', 0x3d, 0x100000001}}, {@aname={'aname', 0x3d, 'ext4\x00'}}, {@version_L}, {@posixacl}], [{@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@uid_lt}]}}) (rerun: 32) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) (async, rerun: 64) open$dir(&(0x7f00000001c0)='mnt\x00', 0x6102, 0x328) (rerun: 64) write(r2, &(0x7f0000000740)='foo', 0x3) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180), 0xffffffffffffffff) 12:47:04 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000850000005000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) flock(r2, 0x2) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) recvmsg(r4, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x40000110) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="4000000010001fff000000000000f4f309000000", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172530000000381028008000a00", @ANYRESDEC=r4], 0x40}, 0x1, 0x0, 0x0, 0x20040810}, 0x0) flock(r3, 0x1) r5 = creat(&(0x7f0000000180)='./file0\x00', 0x0) flock(r5, 0x2) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) lseek(r6, 0x0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', r6}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r8 = getpid() sched_setscheduler(r8, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$unix(r9, &(0x7f0000000180)=@abs, 0x6e) recvmmsg(r9, &(0x7f00000000c0), 0x10106, 0x2, 0x0) lseek(r7, 0x0, 0x1) readv(r7, &(0x7f0000000c80)=[{&(0x7f0000000840)=""/62, 0x3e}], 0x1) close_range(r1, 0xffffffffffffffff, 0x0) 12:47:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='@'], 0x0, 0x236, &(0x7f0000000300)="$eJzs3TFoM2UcBvDnLomf/b4gVRdBUEFEtFDqJrjURaEgpYgIKlREXJRWqC1urZOLg84qnVyKuFkdpUtxUQSnqh3qImhxsDjoELlcK9VGFFNz8t3vB5fcJe97//e4e95kOS5Aa00nmU/SSTKTpJekON/grnqZPt3cntpfTgaDx38shu3q7dpZv2tJtpI8mGSvLPJiN9nYffro54NH731jvXfPe7tPTU30IE8dHx0+dvLu4usfLjyw8fmX3y8WmU//D8d1+YoRn3WL5Jb/otj/RNFtegT8E0uvfvBVlftbk9w9zH8vZeqT9+baDXu93P/OX/V964cvbp/kWIHLNxj0qt/ArQHQOmWSfopyNkm9Xpazs/V/+K87V8uXVtdemXlhdX3l+aZnKuCy9JPDRz6+8tG1P+X/u06df+D6VeX/iaWdb6r1k07TowEmqcr/zLOb90X+oXXkH9pL/qG95B/aS/6hveQf2kv+ob3kH9pL/qG95B/a63z+AYB2GVxp+g5koClNzz8AAAAAAAAAAAAAAAAAAMBF21P7y2fLpGp++nZy/HCS7qj6neHziJMbh69XfyqqZr8r6m5jeebOMXcwpvcbvvv6pm+brf/ZHc3W31xJtl5LMtftXrz+itPr79+7+W++7z03ZoExPfRks/V/3Wm2/sJB8kk1/8yNmn/K3DZ8Hz3/9KvzN2b9l38ZcwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABMzG8BAAD//8n0bSk=") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) mount$9p_unix(&(0x7f0000000000)='./mnt\x00', &(0x7f0000000040)='./mnt\x00', &(0x7f0000000080), 0x1012, &(0x7f00000000c0)={'trans=unix,', {[{@access_user}, {@msize={'msize', 0x3d, 0x100000001}}, {@aname={'aname', 0x3d, 'ext4\x00'}}, {@version_L}, {@posixacl}], [{@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@uid_lt}]}}) (async) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) open$dir(&(0x7f00000001c0)='mnt\x00', 0x6102, 0x328) (async) write(r2, &(0x7f0000000740)='foo', 0x3) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180), 0xffffffffffffffff) [ 2958.931421][ T3271] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 12:47:13 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x145842, 0x0) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x307e00}], 0x1, 0x1400, 0x0, 0x3) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x4003fa) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x14b042, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x163042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000080)={0x6, r3}) lseek(r0, 0x0, 0x3) creat(&(0x7f0000000180)='./file0\x00', 0x0) 12:47:13 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000850000005000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) flock(r2, 0x2) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) recvmsg(r4, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x40000110) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="4000000010001fff000000000000f4f309000000", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172530000000381028008000a00", @ANYRESDEC=r4], 0x40}, 0x1, 0x0, 0x0, 0x20040810}, 0x0) flock(r3, 0x1) r5 = creat(&(0x7f0000000180)='./file0\x00', 0x0) flock(r5, 0x2) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) lseek(r6, 0x0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', r6}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r8 = getpid() sched_setscheduler(r8, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$unix(r9, &(0x7f0000000180)=@abs, 0x6e) recvmmsg(r9, &(0x7f00000000c0), 0x10106, 0x2, 0x0) lseek(r7, 0x0, 0x1) readv(r7, &(0x7f0000000c80)=[{&(0x7f0000000840)=""/62, 0x3e}], 0x1) close_range(r1, 0xffffffffffffffff, 0x0) 12:47:13 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000f00)={&(0x7f0000000dc0), 0xc, &(0x7f0000000ec0)={0x0}}, 0x0) sendmsg$key(r0, 0x0, 0x4000805) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 12:47:13 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x200401, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64fbec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) write(r2, &(0x7f0000000780)="996bafe0066212e3af21f0980574da1730677051ec785f58917fc05744318e2fb76a1f243451f74ee5bb770b5e8db5161c8d6804709f213147e716c86132495571df3d51d85c8518cdc279853f12bb5f0de5bcf2f030f07133b96413b1d94bed31b9127fb3530242b3ef22b4bf68cc490011870088198644d7d837beb2dec7d48e2e50fcb735b3b41485eb44b9473d95ed4522cda95117b4658e264968bdcb848e392dfe568890aa41f26ca71dee64b3a2a9c5d88e8ce0308806", 0xba) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @b}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000b40)={{0x1, 0x1, 0x18, r0}, 'mnt/encrypted_dir\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000140)='vnet_rx_stopped_ack\x00', r4}, 0x10) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) epoll_create1(0x0) getsockopt$PNPIPE_HANDLE(r1, 0x113, 0x3, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r3, 0xc080661a, &(0x7f0000000880)={@desc={0x1, 0x0, @desc4}}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) r6 = open(&(0x7f0000000100)='./mnt\x00', 0x2100, 0x86) write(r5, &(0x7f0000000740)='foo', 0x3) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64fbec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000b00)=0x8, 0x1000) r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000000900), 0x6041, 0x0) r9 = socket(0x200000100000011, 0x803, 0x0) r10 = socket(0x200000100000011, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000040)={'ip6_vti0\x00', 0x0}) sendto$packet(r10, &(0x7f0000000100)='m', 0x10a, 0xfc00, &(0x7f0000000200)={0x21, 0x0, r11, 0x1, 0x0, 0x6, @multicast}, 0x14) sendmsg$nl_route(r8, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)=@ipv4_newaddr={0x48, 0x14, 0x100, 0x70bd27, 0x25dfdbfb, {0x2, 0x1f, 0x0, 0xfe, r11}, [@IFA_TARGET_NETNSID={0x8, 0xa, 0x2}, @IFA_LOCAL={0x8, 0x2, @empty}, @IFA_LOCAL={0x8, 0x2, @loopback}, @IFA_BROADCAST={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x27}}, @IFA_LOCAL={0x8, 0x2, @local}, @IFA_BROADCAST={0x8, 0x4, @empty}]}, 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x2008084) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x18000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r2, &(0x7f0000000040)={0x80000000}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000001, 0x12, r7, 0x3e775000) 12:47:13 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000850000005000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) flock(r2, 0x2) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) recvmsg(r4, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x40000110) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="4000000010001fff000000000000f4f309000000", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172530000000381028008000a00", @ANYRESDEC=r4], 0x40}, 0x1, 0x0, 0x0, 0x20040810}, 0x0) flock(r3, 0x1) r5 = creat(&(0x7f0000000180)='./file0\x00', 0x0) flock(r5, 0x2) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) lseek(r6, 0x0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', r6}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r8 = getpid() sched_setscheduler(r8, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$unix(r9, &(0x7f0000000180)=@abs, 0x6e) recvmmsg(r9, &(0x7f00000000c0), 0x10106, 0x2, 0x0) lseek(r7, 0x0, 0x1) readv(r7, &(0x7f0000000c80)=[{&(0x7f0000000840)=""/62, 0x3e}], 0x1) close_range(r1, 0xffffffffffffffff, 0x0) 12:47:13 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000850000005000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) flock(r2, 0x2) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) recvmsg(r4, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x40000110) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="4000000010001fff000000000000f4f309000000", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172530000000381028008000a00", @ANYRESDEC=r4], 0x40}, 0x1, 0x0, 0x0, 0x20040810}, 0x0) flock(r3, 0x1) r5 = creat(&(0x7f0000000180)='./file0\x00', 0x0) flock(r5, 0x2) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) lseek(r6, 0x0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', r6}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r8 = getpid() sched_setscheduler(r8, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$unix(r9, &(0x7f0000000180)=@abs, 0x6e) recvmmsg(r9, &(0x7f00000000c0), 0x10106, 0x2, 0x0) lseek(r7, 0x0, 0x1) readv(r7, &(0x7f0000000c80)=[{&(0x7f0000000840)=""/62, 0x3e}], 0x1) close_range(r1, 0xffffffffffffffff, 0x0) 12:47:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") (async) r0 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x200401, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64fbec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) write(r2, &(0x7f0000000780)="996bafe0066212e3af21f0980574da1730677051ec785f58917fc05744318e2fb76a1f243451f74ee5bb770b5e8db5161c8d6804709f213147e716c86132495571df3d51d85c8518cdc279853f12bb5f0de5bcf2f030f07133b96413b1d94bed31b9127fb3530242b3ef22b4bf68cc490011870088198644d7d837beb2dec7d48e2e50fcb735b3b41485eb44b9473d95ed4522cda95117b4658e264968bdcb848e392dfe568890aa41f26ca71dee64b3a2a9c5d88e8ce0308806", 0xba) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @b}) (async) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @b}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000b40)={{0x1, 0x1, 0x18, r0}, 'mnt/encrypted_dir\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000140)='vnet_rx_stopped_ack\x00', r4}, 0x10) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) epoll_create1(0x0) getsockopt$PNPIPE_HANDLE(r1, 0x113, 0x3, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r3, 0xc080661a, &(0x7f0000000880)={@desc={0x1, 0x0, @desc4}}) (async) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r3, 0xc080661a, &(0x7f0000000880)={@desc={0x1, 0x0, @desc4}}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) r6 = open(&(0x7f0000000100)='./mnt\x00', 0x2100, 0x86) write(r5, &(0x7f0000000740)='foo', 0x3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64fbec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64fbec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000b00)=0x8, 0x1000) r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000000900), 0x6041, 0x0) r9 = socket(0x200000100000011, 0x803, 0x0) r10 = socket(0x200000100000011, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000040)={'ip6_vti0\x00', 0x0}) sendto$packet(r10, &(0x7f0000000100)='m', 0x10a, 0xfc00, &(0x7f0000000200)={0x21, 0x0, r11, 0x1, 0x0, 0x6, @multicast}, 0x14) sendmsg$nl_route(r8, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)=@ipv4_newaddr={0x48, 0x14, 0x100, 0x70bd27, 0x25dfdbfb, {0x2, 0x1f, 0x0, 0xfe, r11}, [@IFA_TARGET_NETNSID={0x8, 0xa, 0x2}, @IFA_LOCAL={0x8, 0x2, @empty}, @IFA_LOCAL={0x8, 0x2, @loopback}, @IFA_BROADCAST={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x27}}, @IFA_LOCAL={0x8, 0x2, @local}, @IFA_BROADCAST={0x8, 0x4, @empty}]}, 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x2008084) (async) sendmsg$nl_route(r8, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)=@ipv4_newaddr={0x48, 0x14, 0x100, 0x70bd27, 0x25dfdbfb, {0x2, 0x1f, 0x0, 0xfe, r11}, [@IFA_TARGET_NETNSID={0x8, 0xa, 0x2}, @IFA_LOCAL={0x8, 0x2, @empty}, @IFA_LOCAL={0x8, 0x2, @loopback}, @IFA_BROADCAST={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x27}}, @IFA_LOCAL={0x8, 0x2, @local}, @IFA_BROADCAST={0x8, 0x4, @empty}]}, 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x2008084) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x18000, 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x18000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r2, &(0x7f0000000040)={0x80000000}) (async) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r2, &(0x7f0000000040)={0x80000000}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000001, 0x12, r7, 0x3e775000) (async) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000001, 0x12, r7, 0x3e775000) 12:47:13 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x200401, 0x0) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64fbec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) (async) write(r2, &(0x7f0000000780)="996bafe0066212e3af21f0980574da1730677051ec785f58917fc05744318e2fb76a1f243451f74ee5bb770b5e8db5161c8d6804709f213147e716c86132495571df3d51d85c8518cdc279853f12bb5f0de5bcf2f030f07133b96413b1d94bed31b9127fb3530242b3ef22b4bf68cc490011870088198644d7d837beb2dec7d48e2e50fcb735b3b41485eb44b9473d95ed4522cda95117b4658e264968bdcb848e392dfe568890aa41f26ca71dee64b3a2a9c5d88e8ce0308806", 0xba) (async, rerun: 64) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @b}) (async, rerun: 64) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async, rerun: 64) r3 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000b40)={{0x1, 0x1, 0x18, r0}, 'mnt/encrypted_dir\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000140)='vnet_rx_stopped_ack\x00', r4}, 0x10) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) epoll_create1(0x0) getsockopt$PNPIPE_HANDLE(r1, 0x113, 0x3, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) (async, rerun: 64) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r3, 0xc080661a, &(0x7f0000000880)={@desc={0x1, 0x0, @desc4}}) (async, rerun: 64) r5 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) (async) r6 = open(&(0x7f0000000100)='./mnt\x00', 0x2100, 0x86) write(r5, &(0x7f0000000740)='foo', 0x3) (async) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64fbec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000b00)=0x8, 0x1000) (async) r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000000900), 0x6041, 0x0) (async) r9 = socket(0x200000100000011, 0x803, 0x0) r10 = socket(0x200000100000011, 0x803, 0x0) (async) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000040)={'ip6_vti0\x00', 0x0}) sendto$packet(r10, &(0x7f0000000100)='m', 0x10a, 0xfc00, &(0x7f0000000200)={0x21, 0x0, r11, 0x1, 0x0, 0x6, @multicast}, 0x14) sendmsg$nl_route(r8, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)=@ipv4_newaddr={0x48, 0x14, 0x100, 0x70bd27, 0x25dfdbfb, {0x2, 0x1f, 0x0, 0xfe, r11}, [@IFA_TARGET_NETNSID={0x8, 0xa, 0x2}, @IFA_LOCAL={0x8, 0x2, @empty}, @IFA_LOCAL={0x8, 0x2, @loopback}, @IFA_BROADCAST={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x27}}, @IFA_LOCAL={0x8, 0x2, @local}, @IFA_BROADCAST={0x8, 0x4, @empty}]}, 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x2008084) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x18000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r2, &(0x7f0000000040)={0x80000000}) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) (rerun: 64) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000001, 0x12, r7, 0x3e775000) 12:47:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) r3 = socket$xdp(0x2c, 0x3, 0x0) recvmsg(r3, &(0x7f0000000d40)={&(0x7f0000000000)=@can, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000080)=""/48, 0x30}, {&(0x7f00000000c0)=""/206, 0xce}, {&(0x7f00000001c0)=""/78, 0x4e}, {&(0x7f0000000780)=""/108, 0x6c}, {&(0x7f0000000800)=""/94, 0x5e}, {&(0x7f0000000880)=""/179, 0xb3}, {&(0x7f0000000940)=""/136, 0x88}, {&(0x7f0000000a00)=""/197, 0xc5}, {&(0x7f0000000b00)=""/137, 0x89}], 0x9, &(0x7f0000000c80)=""/162, 0xa2}, 0x10020) write(r2, &(0x7f0000000740)='foo', 0x3) 12:47:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) (async) r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) r3 = socket$xdp(0x2c, 0x3, 0x0) recvmsg(r3, &(0x7f0000000d40)={&(0x7f0000000000)=@can, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000080)=""/48, 0x30}, {&(0x7f00000000c0)=""/206, 0xce}, {&(0x7f00000001c0)=""/78, 0x4e}, {&(0x7f0000000780)=""/108, 0x6c}, {&(0x7f0000000800)=""/94, 0x5e}, {&(0x7f0000000880)=""/179, 0xb3}, {&(0x7f0000000940)=""/136, 0x88}, {&(0x7f0000000a00)=""/197, 0xc5}, {&(0x7f0000000b00)=""/137, 0x89}], 0x9, &(0x7f0000000c80)=""/162, 0xa2}, 0x10020) write(r2, &(0x7f0000000740)='foo', 0x3) (async) write(r2, &(0x7f0000000740)='foo', 0x3) [ 2967.525006][ T3289] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2967.544981][ T3288] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2967.554550][ T3291] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 12:47:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") (async) r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) r3 = socket$xdp(0x2c, 0x3, 0x0) recvmsg(r3, &(0x7f0000000d40)={&(0x7f0000000000)=@can, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000080)=""/48, 0x30}, {&(0x7f00000000c0)=""/206, 0xce}, {&(0x7f00000001c0)=""/78, 0x4e}, {&(0x7f0000000780)=""/108, 0x6c}, {&(0x7f0000000800)=""/94, 0x5e}, {&(0x7f0000000880)=""/179, 0xb3}, {&(0x7f0000000940)=""/136, 0x88}, {&(0x7f0000000a00)=""/197, 0xc5}, {&(0x7f0000000b00)=""/137, 0x89}], 0x9, &(0x7f0000000c80)=""/162, 0xa2}, 0x10020) (async) write(r2, &(0x7f0000000740)='foo', 0x3) 12:47:13 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000850000005000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) flock(r2, 0x2) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) recvmsg(r4, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x40000110) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="4000000010001fff000000000000f4f309000000", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172530000000381028008000a00", @ANYRESDEC=r4], 0x40}, 0x1, 0x0, 0x0, 0x20040810}, 0x0) flock(r3, 0x1) r5 = creat(&(0x7f0000000180)='./file0\x00', 0x0) flock(r5, 0x2) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) lseek(r6, 0x0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', r6}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r8 = getpid() sched_setscheduler(r8, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$unix(r9, &(0x7f0000000180)=@abs, 0x6e) recvmmsg(r9, &(0x7f00000000c0), 0x10106, 0x2, 0x0) lseek(r7, 0x0, 0x1) readv(r7, &(0x7f0000000c80)=[{&(0x7f0000000840)=""/62, 0x3e}], 0x1) close_range(r1, 0xffffffffffffffff, 0x0) [ 2967.684246][ T3332] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 12:47:20 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x145842, 0x0) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x307e00}], 0x1, 0x1400, 0x0, 0x3) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x4003fa) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x14b042, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x163042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000080)={0x6, r3}) lseek(r0, 0x0, 0x3) creat(&(0x7f0000000180)='./file0\x00', 0x0) 12:47:20 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000850000005000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) flock(r2, 0x2) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) recvmsg(r4, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x40000110) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="4000000010001fff000000000000f4f309000000", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172530000000381028008000a00", @ANYRESDEC=r4], 0x40}, 0x1, 0x0, 0x0, 0x20040810}, 0x0) flock(r3, 0x1) r5 = creat(&(0x7f0000000180)='./file0\x00', 0x0) flock(r5, 0x2) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) lseek(r6, 0x0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', r6}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r8 = getpid() sched_setscheduler(r8, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$unix(r9, &(0x7f0000000180)=@abs, 0x6e) recvmmsg(r9, &(0x7f00000000c0), 0x10106, 0x2, 0x0) lseek(r7, 0x0, 0x1) readv(r7, &(0x7f0000000c80)=[{&(0x7f0000000840)=""/62, 0x3e}], 0x1) close_range(r1, 0xffffffffffffffff, 0x0) 12:47:20 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000850000005000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) flock(r2, 0x2) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) recvmsg(r4, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x40000110) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="4000000010001fff000000000000f4f309000000", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172530000000381028008000a00", @ANYRESDEC=r4], 0x40}, 0x1, 0x0, 0x0, 0x20040810}, 0x0) flock(r3, 0x1) r5 = creat(&(0x7f0000000180)='./file0\x00', 0x0) flock(r5, 0x2) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) lseek(r6, 0x0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', r6}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r8 = getpid() sched_setscheduler(r8, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$unix(r9, &(0x7f0000000180)=@abs, 0x6e) recvmmsg(r9, &(0x7f00000000c0), 0x10106, 0x2, 0x0) lseek(r7, 0x0, 0x1) readv(r7, &(0x7f0000000c80)=[{&(0x7f0000000840)=""/62, 0x3e}], 0x1) close_range(r1, 0xffffffffffffffff, 0x0) 12:47:20 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000850000005000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) flock(r2, 0x2) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) recvmsg(r4, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x40000110) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="4000000010001fff000000000000f4f309000000", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172530000000381028008000a00", @ANYRESDEC=r4], 0x40}, 0x1, 0x0, 0x0, 0x20040810}, 0x0) flock(r3, 0x1) r5 = creat(&(0x7f0000000180)='./file0\x00', 0x0) flock(r5, 0x2) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) lseek(r6, 0x0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', r6}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r8 = getpid() sched_setscheduler(r8, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$unix(r9, &(0x7f0000000180)=@abs, 0x6e) recvmmsg(r9, &(0x7f00000000c0), 0x10106, 0x2, 0x0) lseek(r7, 0x0, 0x1) readv(r7, &(0x7f0000000c80)=[{&(0x7f0000000840)=""/62, 0x3e}], 0x1) close_range(r1, 0xffffffffffffffff, 0x0) 12:47:20 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000f00)={&(0x7f0000000dc0), 0xc, &(0x7f0000000ec0)={0x0}}, 0x0) sendmsg$key(r0, 0x0, 0x4000805) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 12:47:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f0000000000)={[], [{@subj_role={'subj_role', 0x3d, '#-%,]'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_appraise}, {@seclabel}]}, 0x0, 0x236, &(0x7f0000000300)="$eJzs3TFoM2UcBvDnLomf/b4gVRdBUEFEtFDqJrjURaEgpYgIKlREXJRWqC1urZOLg84qnVyKuFkdpUtxUQSnqh3qImhxsDjoELlcK9VGFFNz8t3vB5fcJe97//e4e95kOS5Aa00nmU/SSTKTpJekON/grnqZPt3cntpfTgaDx38shu3q7dpZv2tJtpI8mGSvLPJiN9nYffro54NH731jvXfPe7tPTU30IE8dHx0+dvLu4usfLjyw8fmX3y8WmU//D8d1+YoRn3WL5Jb/otj/RNFtegT8E0uvfvBVlftbk9w9zH8vZeqT9+baDXu93P/OX/V964cvbp/kWIHLNxj0qt/ArQHQOmWSfopyNkm9Xpazs/V/+K87V8uXVtdemXlhdX3l+aZnKuCy9JPDRz6+8tG1P+X/u06df+D6VeX/iaWdb6r1k07TowEmqcr/zLOb90X+oXXkH9pL/qG95B/aS/6hveQf2kv+ob3kH9pL/qG95B/a63z+AYB2GVxp+g5koClNzz8AAAAAAAAAAAAAAAAAAMBF21P7y2fLpGp++nZy/HCS7qj6neHziJMbh69XfyqqZr8r6m5jeebOMXcwpvcbvvv6pm+brf/ZHc3W31xJtl5LMtftXrz+itPr79+7+W++7z03ZoExPfRks/V/3Wm2/sJB8kk1/8yNmn/K3DZ8Hz3/9KvzN2b9l38ZcwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABMzG8BAAD//8n0bSk=") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x401, 0xfffffc01}}, './mnt\x00'}) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca7e4d5d5bdbe70000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="799cb33c44"], 0x20000600}}, 0x0) r5 = open(&(0x7f0000000400)='./bus\x00', 0x104e042, 0x0) ioctl$int_out(r5, 0x80087601, &(0x7f0000000000)) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000001c0)={0x39, 0x0}, 0x8) r7 = open(&(0x7f0000000400)='./bus\x00', 0x104e042, 0x0) ioctl$int_out(r7, 0x80087601, &(0x7f0000000000)) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000001980)={0x9, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x0, 0x5, 0x9, 0x61eb35e750d79f07, 0xffffffffffffffc0, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000040)='GPL\x00', 0x1000, 0xee, &(0x7f0000001ac0)=""/238, 0x41100, 0x0, '\x00', r3, 0x17, r5, 0x8, &(0x7f0000000080)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x6, 0xde, 0xc6}, 0x10, r6, r7}, 0x80) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64fbec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) r11 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r11, 0x40086602, &(0x7f0000000380)=0x20) ioctl$FS_IOC_SETFLAGS(r11, 0x6611, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r7, 0xd000943e, &(0x7f0000051c80)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r10, 0xc0709411, &(0x7f0000052c80)={{0x0, 0x6, 0x100000000, 0x4393, 0xfffffffffffffff8, 0x7, 0x8, 0x0, 0x9, 0x81, 0x3dd5, 0x101533c4, 0x0, 0x4, 0x7f}, 0x18, [0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000052d40)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r8, 0xd000943d, &(0x7f0000052f40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {r13, r14}], 0x40, "c8d1f7b8914a5a"}) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x1e, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x80000001}, [@map_idx_val={0x18, 0x8, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x4}]}, &(0x7f00000000c0)='syzkaller\x00', 0x8, 0xe1, &(0x7f0000000100)=""/225, 0x41000, 0x10, '\x00', 0x0, 0xd, r1, 0x8, &(0x7f00000002c0)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x2, 0x5, 0x6, 0x6}, 0x10, r6, r9, 0x0, &(0x7f0000000780)=[r11, r0, 0x1]}, 0x80) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r15 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r15, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r16 = openat(0xffffffffffffff9c, &(0x7f0000000080)='mnt/encrypted_dir\x00', 0x981000, 0x4) write(r16, &(0x7f0000000740)='foo', 0x3) 12:47:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f0000000000)={[], [{@subj_role={'subj_role', 0x3d, '#-%,]'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_appraise}, {@seclabel}]}, 0x0, 0x236, &(0x7f0000000300)="$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") (async) r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x401, 0xfffffc01}}, './mnt\x00'}) (async) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) (async) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) (async) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca7e4d5d5bdbe70000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="799cb33c44"], 0x20000600}}, 0x0) r5 = open(&(0x7f0000000400)='./bus\x00', 0x104e042, 0x0) ioctl$int_out(r5, 0x80087601, &(0x7f0000000000)) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000001c0)={0x39, 0x0}, 0x8) (async) r7 = open(&(0x7f0000000400)='./bus\x00', 0x104e042, 0x0) ioctl$int_out(r7, 0x80087601, &(0x7f0000000000)) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000001980)={0x9, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x0, 0x5, 0x9, 0x61eb35e750d79f07, 0xffffffffffffffc0, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000040)='GPL\x00', 0x1000, 0xee, &(0x7f0000001ac0)=""/238, 0x41100, 0x0, '\x00', r3, 0x17, r5, 0x8, &(0x7f0000000080)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x6, 0xde, 0xc6}, 0x10, r6, r7}, 0x80) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64fbec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) r11 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r11, 0x40086602, &(0x7f0000000380)=0x20) (async) ioctl$FS_IOC_SETFLAGS(r11, 0x6611, 0x0) (async) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r7, 0xd000943e, &(0x7f0000051c80)={0x0, 0x0, "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", "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"}) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r10, 0xc0709411, &(0x7f0000052c80)={{0x0, 0x6, 0x100000000, 0x4393, 0xfffffffffffffff8, 0x7, 0x8, 0x0, 0x9, 0x81, 0x3dd5, 0x101533c4, 0x0, 0x4, 0x7f}, 0x18, [0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000052d40)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r8, 0xd000943d, &(0x7f0000052f40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {r13, r14}], 0x40, "c8d1f7b8914a5a"}) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x1e, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x80000001}, [@map_idx_val={0x18, 0x8, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x4}]}, &(0x7f00000000c0)='syzkaller\x00', 0x8, 0xe1, &(0x7f0000000100)=""/225, 0x41000, 0x10, '\x00', 0x0, 0xd, r1, 0x8, &(0x7f00000002c0)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x2, 0x5, 0x6, 0x6}, 0x10, r6, r9, 0x0, &(0x7f0000000780)=[r11, r0, 0x1]}, 0x80) (async) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r15 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r15, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) r16 = openat(0xffffffffffffff9c, &(0x7f0000000080)='mnt/encrypted_dir\x00', 0x981000, 0x4) write(r16, &(0x7f0000000740)='foo', 0x3) [ 2974.816346][ T3408] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2974.839829][ T3418] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2974.849149][ T3415] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 12:47:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f0000000000)={[], [{@subj_role={'subj_role', 0x3d, '#-%,]'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_appraise}, {@seclabel}]}, 0x0, 0x236, &(0x7f0000000300)="$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") (async) r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x401, 0xfffffc01}}, './mnt\x00'}) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) (async) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca7e4d5d5bdbe70000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="799cb33c44"], 0x20000600}}, 0x0) (async) r5 = open(&(0x7f0000000400)='./bus\x00', 0x104e042, 0x0) ioctl$int_out(r5, 0x80087601, &(0x7f0000000000)) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000001c0)={0x39, 0x0}, 0x8) (async) r7 = open(&(0x7f0000000400)='./bus\x00', 0x104e042, 0x0) ioctl$int_out(r7, 0x80087601, &(0x7f0000000000)) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000001980)={0x9, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x0, 0x5, 0x9, 0x61eb35e750d79f07, 0xffffffffffffffc0, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000040)='GPL\x00', 0x1000, 0xee, &(0x7f0000001ac0)=""/238, 0x41100, 0x0, '\x00', r3, 0x17, r5, 0x8, &(0x7f0000000080)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x6, 0xde, 0xc6}, 0x10, r6, r7}, 0x80) (async) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64fbec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) (async) r11 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r11, 0x40086602, &(0x7f0000000380)=0x20) (async) ioctl$FS_IOC_SETFLAGS(r11, 0x6611, 0x0) (async) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r7, 0xd000943e, &(0x7f0000051c80)={0x0, 0x0, "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", "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"}) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r10, 0xc0709411, &(0x7f0000052c80)={{0x0, 0x6, 0x100000000, 0x4393, 0xfffffffffffffff8, 0x7, 0x8, 0x0, 0x9, 0x81, 0x3dd5, 0x101533c4, 0x0, 0x4, 0x7f}, 0x18, [0x0, 0x0, 0x0]}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000052d40)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r8, 0xd000943d, &(0x7f0000052f40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {r13, r14}], 0x40, "c8d1f7b8914a5a"}) (async) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x1e, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x80000001}, [@map_idx_val={0x18, 0x8, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x4}]}, &(0x7f00000000c0)='syzkaller\x00', 0x8, 0xe1, &(0x7f0000000100)=""/225, 0x41000, 0x10, '\x00', 0x0, 0xd, r1, 0x8, &(0x7f00000002c0)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x2, 0x5, 0x6, 0x6}, 0x10, r6, r9, 0x0, &(0x7f0000000780)=[r11, r0, 0x1]}, 0x80) (async) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) r15 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r15, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) r16 = openat(0xffffffffffffff9c, &(0x7f0000000080)='mnt/encrypted_dir\x00', 0x981000, 0x4) write(r16, &(0x7f0000000740)='foo', 0x3) 12:47:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64fbec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) sendfile(r1, r2, &(0x7f0000000040), 0x6) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r4, &(0x7f0000000740)='foo', 0x3) 12:47:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") (async) r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64fbec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) (async) sendfile(r1, r2, &(0x7f0000000040), 0x6) (async) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r4, &(0x7f0000000740)='foo', 0x3) 12:47:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$eJzs3TFoM2UcBvDnLomf/b4gVRdBUEFEtFDqJrjURaEgpYgIKlREXJRWqC1urZOLg84qnVyKuFkdpUtxUQSnqh3qImhxsDjoELlcK9VGFFNz8t3vB5fcJe97//e4e95kOS5Aa00nmU/SSTKTpJekON/grnqZPt3cntpfTgaDx38shu3q7dpZv2tJtpI8mGSvLPJiN9nYffro54NH731jvXfPe7tPTU30IE8dHx0+dvLu4usfLjyw8fmX3y8WmU//D8d1+YoRn3WL5Jb/otj/RNFtegT8E0uvfvBVlftbk9w9zH8vZeqT9+baDXu93P/OX/V964cvbp/kWIHLNxj0qt/ArQHQOmWSfopyNkm9Xpazs/V/+K87V8uXVtdemXlhdX3l+aZnKuCy9JPDRz6+8tG1P+X/u06df+D6VeX/iaWdb6r1k07TowEmqcr/zLOb90X+oXXkH9pL/qG95B/aS/6hveQf2kv+ob3kH9pL/qG95B/a63z+AYB2GVxp+g5koClNzz8AAAAAAAAAAAAAAAAAAMBF21P7y2fLpGp++nZy/HCS7qj6neHziJMbh69XfyqqZr8r6m5jeebOMXcwpvcbvvv6pm+brf/ZHc3W31xJtl5LMtftXrz+itPr79+7+W++7z03ZoExPfRks/V/3Wm2/sJB8kk1/8yNmn/K3DZ8Hz3/9KvzN2b9l38ZcwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABMzG8BAAD//8n0bSk=") (async) r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64fbec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) (async) sendfile(r1, r2, &(0x7f0000000040), 0x6) (async, rerun: 64) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (rerun: 64) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async, rerun: 64) r4 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) (rerun: 64) write(r4, &(0x7f0000000740)='foo', 0x3) 12:47:20 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, 'memory'}]}, 0x8) 12:47:27 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000850000005000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) flock(r2, 0x2) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) recvmsg(r4, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x40000110) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="4000000010001fff000000000000f4f309000000", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172530000000381028008000a00", @ANYRESDEC=r4], 0x40}, 0x1, 0x0, 0x0, 0x20040810}, 0x0) flock(r3, 0x1) r5 = creat(&(0x7f0000000180)='./file0\x00', 0x0) flock(r5, 0x2) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) lseek(r6, 0x0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', r6}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r8 = getpid() sched_setscheduler(r8, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$unix(r9, &(0x7f0000000180)=@abs, 0x6e) recvmmsg(r9, &(0x7f00000000c0), 0x10106, 0x2, 0x0) lseek(r7, 0x0, 0x1) readv(r7, &(0x7f0000000c80)=[{&(0x7f0000000840)=""/62, 0x3e}], 0x1) close_range(r1, 0xffffffffffffffff, 0x0) 12:47:27 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000850000005000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) flock(r2, 0x2) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) recvmsg(r4, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x40000110) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="4000000010001fff000000000000f4f309000000", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172530000000381028008000a00", @ANYRESDEC=r4], 0x40}, 0x1, 0x0, 0x0, 0x20040810}, 0x0) flock(r3, 0x1) r5 = creat(&(0x7f0000000180)='./file0\x00', 0x0) flock(r5, 0x2) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) lseek(r6, 0x0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', r6}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r8 = getpid() sched_setscheduler(r8, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$unix(r9, &(0x7f0000000180)=@abs, 0x6e) recvmmsg(r9, &(0x7f00000000c0), 0x10106, 0x2, 0x0) lseek(r7, 0x0, 0x1) readv(r7, &(0x7f0000000c80)=[{&(0x7f0000000840)=""/62, 0x3e}], 0x1) close_range(r1, 0xffffffffffffffff, 0x0) 12:47:27 executing program 3: prlimit64(0x0, 0x0, &(0x7f0000000140), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='limits\x00') preadv2(r0, &(0x7f0000000340)=[{&(0x7f0000000140)=""/164, 0xa4}], 0x1, 0x0, 0x0, 0x0) 12:47:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$eJzs3TFoM2UcBvDnLomf/b4gVRdBUEFEtFDqJrjURaEgpYgIKlREXJRWqC1urZOLg84qnVyKuFkdpUtxUQSnqh3qImhxsDjoELlcK9VGFFNz8t3vB5fcJe97//e4e95kOS5Aa00nmU/SSTKTpJekON/grnqZPt3cntpfTgaDx38shu3q7dpZv2tJtpI8mGSvLPJiN9nYffro54NH731jvXfPe7tPTU30IE8dHx0+dvLu4usfLjyw8fmX3y8WmU//D8d1+YoRn3WL5Jb/otj/RNFtegT8E0uvfvBVlftbk9w9zH8vZeqT9+baDXu93P/OX/V964cvbp/kWIHLNxj0qt/ArQHQOmWSfopyNkm9Xpazs/V/+K87V8uXVtdemXlhdX3l+aZnKuCy9JPDRz6+8tG1P+X/u06df+D6VeX/iaWdb6r1k07TowEmqcr/zLOb90X+oXXkH9pL/qG95B/aS/6hveQf2kv+ob3kH9pL/qG95B/a63z+AYB2GVxp+g5koClNzz8AAAAAAAAAAAAAAAAAAMBF21P7y2fLpGp++nZy/HCS7qj6neHziJMbh69XfyqqZr8r6m5jeebOMXcwpvcbvvv6pm+brf/ZHc3W31xJtl5LMtftXrz+itPr79+7+W++7z03ZoExPfRks/V/3Wm2/sJB8kk1/8yNmn/K3DZ8Hz3/9KvzN2b9l38ZcwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABMzG8BAAD//8n0bSk=") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000000)=""/24, &(0x7f0000000040)=0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) 12:47:27 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000f00)={&(0x7f0000000dc0), 0xc, &(0x7f0000000ec0)={0x0}}, 0x0) sendmsg$key(r0, 0x0, 0x4000805) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 12:47:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$netlink(r0, 0x10e, 0xc, &(0x7f0000000000)=""/4096, &(0x7f0000001000)=0x1000) 12:47:27 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xd4}]}, &(0x7f0000000540)='GPL\x00', 0x5, 0xf1, &(0x7f00000002c0)=""/241, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:47:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async, rerun: 32) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async, rerun: 32) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000000)=""/24, &(0x7f0000000040)=0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) 12:47:28 executing program 3: r0 = socket(0xa, 0x2, 0x3a) sendmsg$NL80211_CMD_NEW_MPATH(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x80, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}]}, 0x80}}, 0x0) 12:47:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") (async) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) (async) r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000000)=""/24, &(0x7f0000000040)=0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) [ 2982.146611][ T3530] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 12:47:28 executing program 3: set_mempolicy(0x4003, &(0x7f0000007780)=0x6, 0x8) r0 = socket(0x10, 0x3, 0x4) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000040)=@newqdisc={0x6c, 0x14, 0xf0b, 0x0, 0x0, {0x2}, [@TCA_STAB={0x48, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}, {{0x1c, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, {0x8, 0x2, [0x0, 0x0]}}]}]}, 0x6c}}, 0x0) 12:47:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$eJzs3TFoM2UcBvDnLomf/b4gVRdBUEFEtFDqJrjURaEgpYgIKlREXJRWqC1urZOLg84qnVyKuFkdpUtxUQSnqh3qImhxsDjoELlcK9VGFFNz8t3vB5fcJe97//e4e95kOS5Aa00nmU/SSTKTpJekON/grnqZPt3cntpfTgaDx38shu3q7dpZv2tJtpI8mGSvLPJiN9nYffro54NH731jvXfPe7tPTU30IE8dHx0+dvLu4usfLjyw8fmX3y8WmU//D8d1+YoRn3WL5Jb/otj/RNFtegT8E0uvfvBVlftbk9w9zH8vZeqT9+baDXu93P/OX/V964cvbp/kWIHLNxj0qt/ArQHQOmWSfopyNkm9Xpazs/V/+K87V8uXVtdemXlhdX3l+aZnKuCy9JPDRz6+8tG1P+X/u06df+D6VeX/iaWdb6r1k07TowEmqcr/zLOb90X+oXXkH9pL/qG95B/aS/6hveQf2kv+ob3kH9pL/qG95B/a63z+AYB2GVxp+g5koClNzz8AAAAAAAAAAAAAAAAAAMBF21P7y2fLpGp++nZy/HCS7qj6neHziJMbh69XfyqqZr8r6m5jeebOMXcwpvcbvvv6pm+brf/ZHc3W31xJtl5LMtftXrz+itPr79+7+W++7z03ZoExPfRks/V/3Wm2/sJB8kk1/8yNmn/K3DZ8Hz3/9KvzN2b9l38ZcwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABMzG8BAAD//8n0bSk=") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x10, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r3, &(0x7f0000000740)='foo', 0x3) [ 2982.196345][ T3532] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 12:47:28 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000850000005000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) flock(r2, 0x2) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) recvmsg(r4, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x40000110) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="4000000010001fff000000000000f4f309000000", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172530000000381028008000a00", @ANYRESDEC=r4], 0x40}, 0x1, 0x0, 0x0, 0x20040810}, 0x0) flock(r3, 0x1) r5 = creat(&(0x7f0000000180)='./file0\x00', 0x0) flock(r5, 0x2) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) lseek(r6, 0x0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', r6}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r8 = getpid() sched_setscheduler(r8, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$unix(r9, &(0x7f0000000180)=@abs, 0x6e) recvmmsg(r9, &(0x7f00000000c0), 0x10106, 0x2, 0x0) lseek(r7, 0x0, 0x1) readv(r7, &(0x7f0000000c80)=[{&(0x7f0000000840)=""/62, 0x3e}], 0x1) close_range(r1, 0xffffffffffffffff, 0x0) 12:47:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x10, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r3, &(0x7f0000000740)='foo', 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") (async) openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) (async) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) (async) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r0) (async) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x10, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x80) (async) openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) (async) write(r3, &(0x7f0000000740)='foo', 0x3) (async) 12:47:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)={0x44, r1, 0x7, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x14, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x4, 0x2}]}]}]}, 0x44}}, 0x0) 12:47:28 executing program 2: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x18, 0x7, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x7, &(0x7f0000000900)=ANY=[@ANYBLOB="18080000000000000000000000000000850000000800000018100000", @ANYRES32=r0, @ANYBLOB="0000000000000000bfee3ab10000000095"], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2982.319311][ T3575] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 12:47:28 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000002580)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) syslog(0x1, 0x0, 0x0) 12:47:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={0x0, 0x68}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)=@newqdisc={0x30, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_ingress={0xc}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x44, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0xfff3}}, [@filter_kind_options=@f_flower={{0xb}, {0x14, 0x2, [@TCA_FLOWER_KEY_CT_STATE={0x6}, @TCA_FLOWER_KEY_CT_STATE_MASK={0x6}]}}]}, 0x44}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r3, &(0x7f00000002c0), 0x40000000000009f, 0x0) 12:47:36 executing program 2: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x18, 0x7, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x7, &(0x7f0000000900)=ANY=[@ANYBLOB="18080000000000000000000000000000850000000800000018100000", @ANYRES32=r0, @ANYBLOB="0000000000000000bfee3ab10000000095"], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:47:36 executing program 3: r0 = socket(0x11, 0x2, 0x3) r1 = dup(r0) set_mempolicy(0x1, &(0x7f0000000140)=0x1, 0x6257) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x1002}, 0x4) 12:47:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") (async) r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x10, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r3, &(0x7f0000000740)='foo', 0x3) 12:47:36 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@ipv6_newnexthop={0x12, 0x4e, 0x1, 0x0, 0x0, {}, [@NHA_OIF={0x8}]}, 0x20}}, 0x0) 12:47:36 executing program 0: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000300)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_KEY(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000340)={0x1c, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 12:47:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bond_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000880)=@bridge_setlink={0x20, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}}, 0x20}}, 0x0) 12:47:36 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x2, 0x3, 0x2f8, 0x160, 0x0, 0x160, 0x0, 0x62020000, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback=0x7f008e04, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0xb003, 0x130, 0x160, 0x8, {0xf400000000000000}, [@common=@unspec=@string={{0xc0}, {0x0, 0x0, 'bm\x00', "4bc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa2acab6b1d2cc05060feb70b5bc8c2d4ba3a94a2d2393e3182f64695d7d05fb478c8f56627a5cf905d564eeeb83ff0150ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8", 0x5a, 0x2}}]}, @common=@unspec=@CONNMARK={0x30}}, {{@ip={@remote, @dev, 0x0, 0x0, 'veth0_to_hsr\x00', 'team_slave_0\x00', {}, {}, 0x2}, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'syz1\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x358) 12:47:36 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000200000000000000000000c8500000007000000850000000f00000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x78) msync(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x5) 12:47:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r1 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000800)='mnt/encrypted_dir\x00', &(0x7f0000000840)={0x101100, 0x48, 0x9}, 0x18) r2 = openat(r1, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x101043, 0x0) write(r2, &(0x7f0000000740)='foo', 0x3) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000008c0)='attr/current\x00') renameat2(r1, &(0x7f0000000880)='mnt\x00', r3, &(0x7f0000000900)='mnt/encrypted_dir\x00', 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x4, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffff06, 0x0, 0x0, 0x0, 0xffffffff}, [@call={0x85, 0x0, 0x0, 0x19}, @jmp={0x5, 0x1, 0xf, 0x3, 0xb, 0xfffffffffffffffe, 0x1}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0xdc}, @generic={0x4, 0x7, 0xa, 0x5, 0x189}]}, &(0x7f0000000040)='GPL\x00', 0x5, 0xbc, &(0x7f0000000940)=""/188, 0x0, 0x1a, '\x00', 0x0, 0x1e, r2, 0x8, &(0x7f0000000140)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x200}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[r0, r0, r2]}, 0x80) ioctl$F2FS_IOC_MOVE_RANGE(r4, 0xc020f509, &(0x7f0000000200)={0xffffffffffffffff, 0x9, 0x1, 0x7}) 12:47:36 executing program 2: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x18, 0x7, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x7, &(0x7f0000000900)=ANY=[@ANYBLOB="18080000000000000000000000000000850000000800000018100000", @ANYRES32=r0, @ANYBLOB="0000000000000000bfee3ab10000000095"], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:47:36 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000021c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0x1, 0x0, 0x0, 0x3}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) [ 2990.532596][ T3670] xt_CT: No such helper "syz1" [ 2994.609790][ T3680] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 12:47:41 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000a80)=@raw={'raw\x00', 0x4001, 0x3, 0x570, 0x0, 0xb, 0x148, 0x420, 0x148, 0x4d8, 0x240, 0x229, 0x4d8, 0x215, 0x7fffffe, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth0\x00'}, 0x0, 0x3f8, 0x420, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'ipvlan1\x00', {0x0, 0x25, 0x0, 0x0, 0x6000000, 0xffff, 0xffffff81}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@NFQUEUE1={0x28}}, {{@uncond, 0xec010000, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00', 0x28, {0x0, 0x0, 0x0, 0x0, 'snmp\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x5d0) 12:47:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c000000380009002cbd700000000000020000000400000014000180ffffffff"], 0x2c}}, 0x0) 12:47:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$eJzs3TFoM2UcBvDnLomf/b4gVRdBUEFEtFDqJrjURaEgpYgIKlREXJRWqC1urZOLg84qnVyKuFkdpUtxUQSnqh3qImhxsDjoELlcK9VGFFNz8t3vB5fcJe97//e4e95kOS5Aa00nmU/SSTKTpJekON/grnqZPt3cntpfTgaDx38shu3q7dpZv2tJtpI8mGSvLPJiN9nYffro54NH731jvXfPe7tPTU30IE8dHx0+dvLu4usfLjyw8fmX3y8WmU//D8d1+YoRn3WL5Jb/otj/RNFtegT8E0uvfvBVlftbk9w9zH8vZeqT9+baDXu93P/OX/V964cvbp/kWIHLNxj0qt/ArQHQOmWSfopyNkm9Xpazs/V/+K87V8uXVtdemXlhdX3l+aZnKuCy9JPDRz6+8tG1P+X/u06df+D6VeX/iaWdb6r1k07TowEmqcr/zLOb90X+oXXkH9pL/qG95B/aS/6hveQf2kv+ob3kH9pL/qG95B/a63z+AYB2GVxp+g5koClNzz8AAAAAAAAAAAAAAAAAAMBF21P7y2fLpGp++nZy/HCS7qj6neHziJMbh69XfyqqZr8r6m5jeebOMXcwpvcbvvv6pm+brf/ZHc3W31xJtl5LMtftXrz+itPr79+7+W++7z03ZoExPfRks/V/3Wm2/sJB8kk1/8yNmn/K3DZ8Hz3/9KvzN2b9l38ZcwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABMzG8BAAD//8n0bSk=") (async) r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) r1 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000800)='mnt/encrypted_dir\x00', &(0x7f0000000840)={0x101100, 0x48, 0x9}, 0x18) r2 = openat(r1, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x101043, 0x0) write(r2, &(0x7f0000000740)='foo', 0x3) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000008c0)='attr/current\x00') renameat2(r1, &(0x7f0000000880)='mnt\x00', r3, &(0x7f0000000900)='mnt/encrypted_dir\x00', 0x1) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x4, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffff06, 0x0, 0x0, 0x0, 0xffffffff}, [@call={0x85, 0x0, 0x0, 0x19}, @jmp={0x5, 0x1, 0xf, 0x3, 0xb, 0xfffffffffffffffe, 0x1}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0xdc}, @generic={0x4, 0x7, 0xa, 0x5, 0x189}]}, &(0x7f0000000040)='GPL\x00', 0x5, 0xbc, &(0x7f0000000940)=""/188, 0x0, 0x1a, '\x00', 0x0, 0x1e, r2, 0x8, &(0x7f0000000140)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x200}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[r0, r0, r2]}, 0x80) ioctl$F2FS_IOC_MOVE_RANGE(r4, 0xc020f509, &(0x7f0000000200)={0xffffffffffffffff, 0x9, 0x1, 0x7}) 12:47:41 executing program 2: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x18, 0x7, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x7, &(0x7f0000000900)=ANY=[@ANYBLOB="18080000000000000000000000000000850000000800000018100000", @ANYRES32=r0, @ANYBLOB="0000000000000000bfee3ab10000000095"], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:47:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x64, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x38, 0x4, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, @exthdr={{0xb}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_LEN={0x8}, @NFTA_EXTHDR_DREG={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_EXTHDR_TYPE={0x5}, @NFTA_EXTHDR_OFFSET={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x8c}}, 0x0) 12:47:41 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x2, 0x3, 0x2f8, 0x160, 0x0, 0x160, 0x0, 0x62020000, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback=0x7f008e04, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0xb003, 0x130, 0x160, 0x8, {0xf400000000000000}, [@common=@unspec=@string={{0xc0}, {0x0, 0x0, 'bm\x00', "4bc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa2acab6b1d2cc05060feb70b5bc8c2d4ba3a94a2d2393e3182f64695d7d05fb478c8f56627a5cf905d564eeeb83ff0150ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8", 0x5a, 0x2}}]}, @common=@unspec=@CONNMARK={0x30}}, {{@ip={@remote, @dev, 0x0, 0x0, 'veth0_to_hsr\x00', 'team_slave_0\x00', {}, {}, 0x2}, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'syz1\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x358) 12:47:41 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{0xc}, {0x2d}, {0x6, 0x0, 0x0, 0x7fff7ffe}]}) socket$inet_tcp(0x2, 0x1, 0x0) 12:47:41 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) time(0xffffffffffffffff) 12:47:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$eJzs3TFoM2UcBvDnLomf/b4gVRdBUEFEtFDqJrjURaEgpYgIKlREXJRWqC1urZOLg84qnVyKuFkdpUtxUQSnqh3qImhxsDjoELlcK9VGFFNz8t3vB5fcJe97//e4e95kOS5Aa00nmU/SSTKTpJekON/grnqZPt3cntpfTgaDx38shu3q7dpZv2tJtpI8mGSvLPJiN9nYffro54NH731jvXfPe7tPTU30IE8dHx0+dvLu4usfLjyw8fmX3y8WmU//D8d1+YoRn3WL5Jb/otj/RNFtegT8E0uvfvBVlftbk9w9zH8vZeqT9+baDXu93P/OX/V964cvbp/kWIHLNxj0qt/ArQHQOmWSfopyNkm9Xpazs/V/+K87V8uXVtdemXlhdX3l+aZnKuCy9JPDRz6+8tG1P+X/u06df+D6VeX/iaWdb6r1k07TowEmqcr/zLOb90X+oXXkH9pL/qG95B/aS/6hveQf2kv+ob3kH9pL/qG95B/a63z+AYB2GVxp+g5koClNzz8AAAAAAAAAAAAAAAAAAMBF21P7y2fLpGp++nZy/HCS7qj6neHziJMbh69XfyqqZr8r6m5jeebOMXcwpvcbvvv6pm+brf/ZHc3W31xJtl5LMtftXrz+itPr79+7+W++7z03ZoExPfRks/V/3Wm2/sJB8kk1/8yNmn/K3DZ8Hz3/9KvzN2b9l38ZcwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABMzG8BAAD//8n0bSk=") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async, rerun: 32) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (rerun: 32) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r1 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000800)='mnt/encrypted_dir\x00', &(0x7f0000000840)={0x101100, 0x48, 0x9}, 0x18) r2 = openat(r1, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x101043, 0x0) write(r2, &(0x7f0000000740)='foo', 0x3) (async) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000008c0)='attr/current\x00') renameat2(r1, &(0x7f0000000880)='mnt\x00', r3, &(0x7f0000000900)='mnt/encrypted_dir\x00', 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x4, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffff06, 0x0, 0x0, 0x0, 0xffffffff}, [@call={0x85, 0x0, 0x0, 0x19}, @jmp={0x5, 0x1, 0xf, 0x3, 0xb, 0xfffffffffffffffe, 0x1}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0xdc}, @generic={0x4, 0x7, 0xa, 0x5, 0x189}]}, &(0x7f0000000040)='GPL\x00', 0x5, 0xbc, &(0x7f0000000940)=""/188, 0x0, 0x1a, '\x00', 0x0, 0x1e, r2, 0x8, &(0x7f0000000140)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x200}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[r0, r0, r2]}, 0x80) ioctl$F2FS_IOC_MOVE_RANGE(r4, 0xc020f509, &(0x7f0000000200)={0xffffffffffffffff, 0x9, 0x1, 0x7}) 12:47:41 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x2, 0x3, 0x2f8, 0x160, 0x0, 0x160, 0x0, 0x62020000, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback=0x7f008e04, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0xb003, 0x130, 0x160, 0x8, {0xf400000000000000}, [@common=@unspec=@string={{0xc0}, {0x0, 0x0, 'bm\x00', "4bc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa2acab6b1d2cc05060feb70b5bc8c2d4ba3a94a2d2393e3182f64695d7d05fb478c8f56627a5cf905d564eeeb83ff0150ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8", 0x5a, 0x2}}]}, @common=@unspec=@CONNMARK={0x30}}, {{@ip={@remote, @dev, 0x0, 0x0, 'veth0_to_hsr\x00', 'team_slave_0\x00', {}, {}, 0x2}, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'syz1\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x358) 12:47:41 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = epoll_create1(0x0) close(r1) socket$phonet_pipe(0x23, 0x5, 0x2) r2 = dup3(r1, r0, 0x0) connect$inet6(r2, &(0x7f0000000380)={0xa, 0x0, 0x0, @remote}, 0x1c) 12:47:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r1, &(0x7f0000000740)='foo', 0x3) [ 2995.465687][ T3698] netlink: del zone limit has 4 unknown bytes [ 2995.476132][ T3687] xt_CT: No such helper "syz1" [ 2995.520887][ T25] audit: type=1400 audit(1682858861.338:1160): avc: denied { connect } for pid=3706 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 2995.549029][ T3708] xt_CT: No such helper "syz1" 12:47:49 executing program 4: r0 = perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x3b) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) rseq(&(0x7f00000005c0), 0x20, 0x0, 0x0) 12:47:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r2) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010001b070000c300007de80f8ba30000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000900)=@newqdisc={0x64, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x38, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{}, {}, 0x0, 0x9}}, @TCA_TBF_RATE64={0xc, 0x4, 0xba5f6d3a58c1dfad}]}}]}, 0x64}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x3) sendmsg$nl_route_sched(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@newqdisc={0x34, 0x24, 0xf07, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_pfifo_fast={0xf}]}, 0x34}}, 0x0) getsockname$packet(r5, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x3) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@newqdisc={0x24, 0x24, 0xf07, 0x0, 0x0, {0x0, 0x0, 0x0, r9, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 12:47:49 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000a80)=@raw={'raw\x00', 0x4001, 0x3, 0x570, 0x0, 0xb, 0x148, 0x420, 0x148, 0x4d8, 0x240, 0x229, 0x4d8, 0x215, 0x7fffffe, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth0\x00'}, 0x0, 0x3f8, 0x420, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'ipvlan1\x00', {0x0, 0x25, 0x0, 0x0, 0x6000000, 0xffff, 0xffffff81}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@NFQUEUE1={0x28}}, {{@uncond, 0xec010000, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00', 0x28, {0x0, 0x0, 0x0, 0x0, 'snmp\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x5d0) 12:47:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$eJzs3TFoM2UcBvDnLomf/b4gVRdBUEFEtFDqJrjURaEgpYgIKlREXJRWqC1urZOLg84qnVyKuFkdpUtxUQSnqh3qImhxsDjoELlcK9VGFFNz8t3vB5fcJe97//e4e95kOS5Aa00nmU/SSTKTpJekON/grnqZPt3cntpfTgaDx38shu3q7dpZv2tJtpI8mGSvLPJiN9nYffro54NH731jvXfPe7tPTU30IE8dHx0+dvLu4usfLjyw8fmX3y8WmU//D8d1+YoRn3WL5Jb/otj/RNFtegT8E0uvfvBVlftbk9w9zH8vZeqT9+baDXu93P/OX/V964cvbp/kWIHLNxj0qt/ArQHQOmWSfopyNkm9Xpazs/V/+K87V8uXVtdemXlhdX3l+aZnKuCy9JPDRz6+8tG1P+X/u06df+D6VeX/iaWdb6r1k07TowEmqcr/zLOb90X+oXXkH9pL/qG95B/aS/6hveQf2kv+ob3kH9pL/qG95B/a63z+AYB2GVxp+g5koClNzz8AAAAAAAAAAAAAAAAAAMBF21P7y2fLpGp++nZy/HCS7qj6neHziJMbh69XfyqqZr8r6m5jeebOMXcwpvcbvvv6pm+brf/ZHc3W31xJtl5LMtftXrz+itPr79+7+W++7z03ZoExPfRks/V/3Wm2/sJB8kk1/8yNmn/K3DZ8Hz3/9KvzN2b9l38ZcwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABMzG8BAAD//8n0bSk=") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r1, &(0x7f0000000740)='foo', 0x3) 12:47:49 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x2, 0x3, 0x2f8, 0x160, 0x0, 0x160, 0x0, 0x62020000, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback=0x7f008e04, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0xb003, 0x130, 0x160, 0x8, {0xf400000000000000}, [@common=@unspec=@string={{0xc0}, {0x0, 0x0, 'bm\x00', "4bc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa2acab6b1d2cc05060feb70b5bc8c2d4ba3a94a2d2393e3182f64695d7d05fb478c8f56627a5cf905d564eeeb83ff0150ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8", 0x5a, 0x2}}]}, @common=@unspec=@CONNMARK={0x30}}, {{@ip={@remote, @dev, 0x0, 0x0, 'veth0_to_hsr\x00', 'team_slave_0\x00', {}, {}, 0x2}, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'syz1\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x358) 12:47:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)={0x48, 0x1, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_REPLY={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast2}}}]}, @CTA_STATUS_MASK={0x8, 0x1a, 0x1, 0x0, 0x3}, @CTA_STATUS={0x8}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_REPLY_FLAGS={0x8, 0x2, 0x1}]}]}, 0x48}}, 0x0) 12:47:49 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(r0, 0xc4c03d12, 0x0) 12:47:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) (async) r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r1, &(0x7f0000000740)='foo', 0x3) [ 3003.804612][ T3715] xt_hashlimit: max too large, truncated to 1048576 [ 3003.811757][ T3715] xt_NFQUEUE: number of total queues is 0 [ 3003.837139][ T3727] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 12:47:49 executing program 4: r0 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000780)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000108f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f736530000000000000000000000000000000000000000000000000000000000000e4ff08000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c0000000000000000210000000000000000000000000000000000000000000000fcffffffffffffff00000000000000000000000003000000070000000000000000000000000000004800435400000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000009000000000000000000000000000000200000000000000000000000000400000000000000000000000000000070009000000000094100000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000004000000000000000000000000000000000000000000000feffffff"], 0x1) r1 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_misc(r1, &(0x7f0000000040)={'syz1'}, 0x4) [ 3003.894427][ T25] audit: type=1326 audit(1682858869.678:1161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3717 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fce2182d169 code=0x7ffc0000 [ 3003.918427][ T25] audit: type=1326 audit(1682858869.678:1162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3717 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=334 compat=0 ip=0x7fce2182d169 code=0x7ffc0000 [ 3003.942342][ T25] audit: type=1326 audit(1682858869.678:1163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3717 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fce2182d169 code=0x7ffc0000 [ 3003.966277][ T25] audit: type=1400 audit(1682858869.698:1164): avc: denied { read } for pid=3730 comm="syz-executor.4" name="ptp0" dev="devtmpfs" ino=220 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 3003.979787][ T3718] xt_CT: No such helper "syz1" 12:47:49 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x24000880) 12:47:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r1, &(0x7f0000000740)='foo', 0x3) 12:47:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) r0 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r1, &(0x7f0000000740)='foo', 0x3) 12:47:49 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x5, 0x806, 0x7, 0x81}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000240), 0x1e2b, r0}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000200), &(0x7f0000000000)=""/8}, 0x20) 12:47:49 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x6628, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) [ 3003.989563][ T25] audit: type=1400 audit(1682858869.698:1165): avc: denied { open } for pid=3730 comm="syz-executor.4" path="/dev/ptp0" dev="devtmpfs" ino=220 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 3004.018208][ T25] audit: type=1400 audit(1682858869.698:1166): avc: denied { ioctl } for pid=3730 comm="syz-executor.4" path="/dev/ptp0" dev="devtmpfs" ino=220 ioctlcmd=0x3d12 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 12:47:55 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000a80)=@raw={'raw\x00', 0x4001, 0x3, 0x570, 0x0, 0xb, 0x148, 0x420, 0x148, 0x4d8, 0x240, 0x229, 0x4d8, 0x215, 0x7fffffe, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth0\x00'}, 0x0, 0x3f8, 0x420, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'ipvlan1\x00', {0x0, 0x25, 0x0, 0x0, 0x6000000, 0xffff, 0xffffff81}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@NFQUEUE1={0x28}}, {{@uncond, 0xec010000, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00', 0x28, {0x0, 0x0, 0x0, 0x0, 'snmp\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x5d0) 12:47:55 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000001c0)=@security={'security\x00', 0xe, 0x4, 0x338, 0xffffffff, 0x110, 0x1a8, 0x90, 0xffffffff, 0xffffffff, 0x110, 0x2a0, 0x2a0, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xb0, 0x110, 0x0, {}, [@common=@set={{0x40}}]}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffe}}, {{@ip={@empty, @private, 0x0, 0x0, 'vlan0\x00', 'vlan0\x00'}, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x398) 12:47:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") (async) openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r1, &(0x7f0000000740)='foo', 0x3) 12:47:55 executing program 4: r0 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000780)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000108f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f736530000000000000000000000000000000000000000000000000000000000000e4ff08000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c0000000000000000210000000000000000000000000000000000000000000000fcffffffffffffff00000000000000000000000003000000070000000000000000000000000000004800435400000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000009000000000000000000000000000000200000000000000000000000000400000000000000000000000000000070009000000000094100000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000004000000000000000000000000000000000000000000000feffffff"], 0x1) r1 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_misc(r1, &(0x7f0000000040)={'syz1'}, 0x4) 12:47:55 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newsa={0xec, 0x15, 0x713, 0x0, 0x0, {{@in6=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@private2}, @in6=@loopback}}, 0xec}}, 0x0) 12:47:55 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x6628, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) 12:47:55 executing program 3: pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) sendfile(r0, r1, 0x0, 0x0) 12:47:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000100)=ANY=[], &(0x7f0000000000)=""/214, 0x4a, 0xd6, 0x1}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x7, 0x4, 0x0, 0x3, 0x20084, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x0, @perf_config_ext={0x1, 0x14b7f937}, 0x84000, 0x3, 0x0, 0x1, 0x7fff, 0x4f9, 0x8000, 0x0, 0x99}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x8) r0 = perf_event_open(0x0, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={0xffffffffffffffff, 0xfffffffd}, 0xc) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000745c0)={0x5af, [], 0x81, "7464fbe08eb369"}) r1 = socket$unix(0x1, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000ac0)) syz_clone(0x74809480, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 12:47:55 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x50, 0x140c, 0x200, 0x70bd2a, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_RES_CQN={0x8, 0x3d, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4004}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r3, &(0x7f0000000740)='foo', 0x3) 12:47:56 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=@updpolicy={0x1fc, 0x19, 0x1, 0x0, 0x0, {{@in6=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@tmpl={0x144, 0x5, [{{@in6=@empty, 0x0, 0x6c}, 0x0, @in=@empty}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@private0}, {{@in=@dev, 0x0, 0x2b}, 0x0, @in=@remote}, {{@in=@empty, 0x0, 0x2b}, 0x0, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast1, 0x0, 0x1}]}]}, 0x1fc}}, 0x0) 12:47:56 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x50, 0x140c, 0x200, 0x70bd2a, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_RES_CQN={0x8, 0x3d, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4004}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r3, &(0x7f0000000740)='foo', 0x3) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") (async) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x50, 0x140c, 0x200, 0x70bd2a, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_RES_CQN={0x8, 0x3d, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4004}, 0x10) (async) openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) (async) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) (async) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) (async) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) (async) write(r3, &(0x7f0000000740)='foo', 0x3) (async) 12:47:56 executing program 3: perf_event_open$cgroup(&(0x7f00000006c0)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:48:04 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000a80)=@raw={'raw\x00', 0x4001, 0x3, 0x570, 0x0, 0xb, 0x148, 0x420, 0x148, 0x4d8, 0x240, 0x229, 0x4d8, 0x215, 0x7fffffe, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth0\x00'}, 0x0, 0x3f8, 0x420, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'ipvlan1\x00', {0x0, 0x25, 0x0, 0x0, 0x6000000, 0xffff, 0xffffff81}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@NFQUEUE1={0x28}}, {{@uncond, 0xec010000, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00', 0x28, {0x0, 0x0, 0x0, 0x0, 'snmp\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x5d0) 12:48:04 executing program 4: r0 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000780)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000108f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f736530000000000000000000000000000000000000000000000000000000000000e4ff08000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c0000000000000000210000000000000000000000000000000000000000000000fcffffffffffffff00000000000000000000000003000000070000000000000000000000000000004800435400000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000009000000000000000000000000000000200000000000000000000000000400000000000000000000000000000070009000000000094100000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000004000000000000000000000000000000000000000000000feffffff"], 0x1) r1 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_misc(r1, &(0x7f0000000040)={'syz1'}, 0x4) 12:48:04 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x50, 0x140c, 0x200, 0x70bd2a, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_RES_CQN={0x8, 0x3d, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4004}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r3, &(0x7f0000000740)='foo', 0x3) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$eJzs3TFoM2UcBvDnLomf/b4gVRdBUEFEtFDqJrjURaEgpYgIKlREXJRWqC1urZOLg84qnVyKuFkdpUtxUQSnqh3qImhxsDjoELlcK9VGFFNz8t3vB5fcJe97//e4e95kOS5Aa00nmU/SSTKTpJekON/grnqZPt3cntpfTgaDx38shu3q7dpZv2tJtpI8mGSvLPJiN9nYffro54NH731jvXfPe7tPTU30IE8dHx0+dvLu4usfLjyw8fmX3y8WmU//D8d1+YoRn3WL5Jb/otj/RNFtegT8E0uvfvBVlftbk9w9zH8vZeqT9+baDXu93P/OX/V964cvbp/kWIHLNxj0qt/ArQHQOmWSfopyNkm9Xpazs/V/+K87V8uXVtdemXlhdX3l+aZnKuCy9JPDRz6+8tG1P+X/u06df+D6VeX/iaWdb6r1k07TowEmqcr/zLOb90X+oXXkH9pL/qG95B/aS/6hveQf2kv+ob3kH9pL/qG95B/a63z+AYB2GVxp+g5koClNzz8AAAAAAAAAAAAAAAAAAMBF21P7y2fLpGp++nZy/HCS7qj6neHziJMbh69XfyqqZr8r6m5jeebOMXcwpvcbvvv6pm+brf/ZHc3W31xJtl5LMtftXrz+itPr79+7+W++7z03ZoExPfRks/V/3Wm2/sJB8kk1/8yNmn/K3DZ8Hz3/9KvzN2b9l38ZcwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABMzG8BAAD//8n0bSk=") (async) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x50, 0x140c, 0x200, 0x70bd2a, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_RES_CQN={0x8, 0x3d, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4004}, 0x10) (async) openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) (async) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) (async) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) (async) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) (async) write(r3, &(0x7f0000000740)='foo', 0x3) (async) 12:48:04 executing program 3: perf_event_open$cgroup(&(0x7f00000006c0)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:48:04 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x6628, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) 12:48:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000100)=ANY=[], &(0x7f0000000000)=""/214, 0x4a, 0xd6, 0x1}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x7, 0x4, 0x0, 0x3, 0x20084, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x0, @perf_config_ext={0x1, 0x14b7f937}, 0x84000, 0x3, 0x0, 0x1, 0x7fff, 0x4f9, 0x8000, 0x0, 0x99}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x8) r0 = perf_event_open(0x0, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={0xffffffffffffffff, 0xfffffffd}, 0xc) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000745c0)={0x5af, [], 0x81, "7464fbe08eb369"}) r1 = socket$unix(0x1, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000ac0)) syz_clone(0x74809480, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 12:48:04 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="eacd0209e7b6cb1aca15f3403a424853335c01a818d5aeafe43379ae1639fef42205fb2473649ec7039ea8fe4b369a074ec76e79c8f61b98d3e5335cbec09e595e77ba59a4e697294da21f80b71dbbaf962cc3bb9eb9bb6cdc14f3caea2c97c4d1d4a08c04ee22b056ec5a6b744737ee09000000000000008d6dddd730582efe191cdc5ae2b6fbb7820a37ae48a983cf48c8da38c7d0405ad332060a52e8938b66130394b7969038b364da7b543dc4fd5a5277b9cc0733ed4cffb429ddcd4bf825e69d33e4e57144cc9287795011101f862915ab622f5b0f4f8d30ccbc456017f9d3e0234798bed4fd5701e0"], 0x0, 0x236, &(0x7f0000000300)="$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") r1 = openat(r0, &(0x7f0000000000)='mnt/encrypted_dir/file\x00', 0x0, 0x117) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000380)=0x20) ioctl$FS_IOC_SETFLAGS(r5, 0x6611, 0x0) getdents64(r5, &(0x7f00000000c0)=""/131, 0x83) getpeername$packet(r4, 0x0, &(0x7f0000000080)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8}, 0x20) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000040)={r8, 0x5a7}, &(0x7f0000000080)=0x8) write(r3, &(0x7f0000000740)='foo', 0x3) [ 3018.447175][ T3802] xt_hashlimit: max too large, truncated to 1048576 [ 3018.455115][ T3802] xt_NFQUEUE: number of total queues is 0 12:48:04 executing program 3: perf_event_open$cgroup(&(0x7f00000006c0)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:48:04 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="eacd0209e7b6cb1aca15f3403a424853335c01a818d5aeafe43379ae1639fef42205fb2473649ec7039ea8fe4b369a074ec76e79c8f61b98d3e5335cbec09e595e77ba59a4e697294da21f80b71dbbaf962cc3bb9eb9bb6cdc14f3caea2c97c4d1d4a08c04ee22b056ec5a6b744737ee09000000000000008d6dddd730582efe191cdc5ae2b6fbb7820a37ae48a983cf48c8da38c7d0405ad332060a52e8938b66130394b7969038b364da7b543dc4fd5a5277b9cc0733ed4cffb429ddcd4bf825e69d33e4e57144cc9287795011101f862915ab622f5b0f4f8d30ccbc456017f9d3e0234798bed4fd5701e0"], 0x0, 0x236, &(0x7f0000000300)="$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") r1 = openat(r0, &(0x7f0000000000)='mnt/encrypted_dir/file\x00', 0x0, 0x117) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000380)=0x20) (async) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000380)=0x20) ioctl$FS_IOC_SETFLAGS(r5, 0x6611, 0x0) getdents64(r5, &(0x7f00000000c0)=""/131, 0x83) getpeername$packet(r4, 0x0, &(0x7f0000000080)) (async) getpeername$packet(r4, 0x0, &(0x7f0000000080)) socket$inet6_sctp(0xa, 0x5, 0x84) (async) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x80001, 0x84) (async) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8}, 0x20) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000040)={r8, 0x5a7}, &(0x7f0000000080)=0x8) (async) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000040)={r8, 0x5a7}, &(0x7f0000000080)=0x8) write(r3, &(0x7f0000000740)='foo', 0x3) (async) write(r3, &(0x7f0000000740)='foo', 0x3) 12:48:04 executing program 3: perf_event_open$cgroup(&(0x7f00000006c0)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:48:04 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="eacd0209e7b6cb1aca15f3403a424853335c01a818d5aeafe43379ae1639fef42205fb2473649ec7039ea8fe4b369a074ec76e79c8f61b98d3e5335cbec09e595e77ba59a4e697294da21f80b71dbbaf962cc3bb9eb9bb6cdc14f3caea2c97c4d1d4a08c04ee22b056ec5a6b744737ee09000000000000008d6dddd730582efe191cdc5ae2b6fbb7820a37ae48a983cf48c8da38c7d0405ad332060a52e8938b66130394b7969038b364da7b543dc4fd5a5277b9cc0733ed4cffb429ddcd4bf825e69d33e4e57144cc9287795011101f862915ab622f5b0f4f8d30ccbc456017f9d3e0234798bed4fd5701e0"], 0x0, 0x236, &(0x7f0000000300)="$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") r1 = openat(r0, &(0x7f0000000000)='mnt/encrypted_dir/file\x00', 0x0, 0x117) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async, rerun: 64) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async, rerun: 64) r2 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) r3 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000380)=0x20) (async, rerun: 64) ioctl$FS_IOC_SETFLAGS(r5, 0x6611, 0x0) (async, rerun: 64) getdents64(r5, &(0x7f00000000c0)=""/131, 0x83) (async) getpeername$packet(r4, 0x0, &(0x7f0000000080)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) (async) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8}, 0x20) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000040)={r8, 0x5a7}, &(0x7f0000000080)=0x8) write(r3, &(0x7f0000000740)='foo', 0x3) 12:48:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newqdisc={0x2c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@gettclass={0x24, 0x25, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x0, 0xfff1}}}, 0x24}}, 0x0) [ 3018.861474][ T3839] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3024.684556][ T3846] xt_hashlimit: max too large, truncated to 1048576 [ 3024.692130][ T3846] xt_NFQUEUE: number of total queues is 0 12:48:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000100)=ANY=[], &(0x7f0000000000)=""/214, 0x4a, 0xd6, 0x1}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x7, 0x4, 0x0, 0x3, 0x20084, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x0, @perf_config_ext={0x1, 0x14b7f937}, 0x84000, 0x3, 0x0, 0x1, 0x7fff, 0x4f9, 0x8000, 0x0, 0x99}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x8) r0 = perf_event_open(0x0, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={0xffffffffffffffff, 0xfffffffd}, 0xc) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000745c0)={0x5af, [], 0x81, "7464fbe08eb369"}) r1 = socket$unix(0x1, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000ac0)) syz_clone(0x74809480, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 12:48:10 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x6628, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x6628, 0x0) 12:48:10 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r1 = openat(r0, &(0x7f0000000000)='mnt', 0x30000, 0x3) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r3, &(0x7f0000000740)='foo', 0x3) 12:48:10 executing program 4: r0 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000780)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000108f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f736530000000000000000000000000000000000000000000000000000000000000e4ff08000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c0000000000000000210000000000000000000000000000000000000000000000fcffffffffffffff00000000000000000000000003000000070000000000000000000000000000004800435400000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000009000000000000000000000000000000200000000000000000000000000400000000000000000000000000000070009000000000094100000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000004000000000000000000000000000000000000000000000feffffff"], 0x1) r1 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_misc(r1, &(0x7f0000000040)={'syz1'}, 0x4) 12:48:10 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0001000003140900000000000000df250900020073797a32000000000800410072786500140033007465616d30"], 0x100}}, 0x0) 12:48:10 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c40)={&(0x7f0000000c00)='ext4_es_remove_extent\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) 12:48:10 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r1 = openat(r0, &(0x7f0000000000)='mnt', 0x30000, 0x3) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r3, &(0x7f0000000740)='foo', 0x3) [ 3024.879904][ T3856] netlink: 200 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3024.916614][ T3856] (null): rxe_set_mtu: Set mtu to 1024 [ 3024.916755][ T3856] rdma_rxe: rxe_newlink: failed to add team0 [ 3024.916755][ T3856] 12:48:10 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0001000003140900000000000000df250900020073797a32000000000800410072786500140033007465616d30"], 0x100}}, 0x0) 12:48:10 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r1 = openat(r0, &(0x7f0000000000)='mnt', 0x30000, 0x3) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) r3 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r3, &(0x7f0000000740)='foo', 0x3) 12:48:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$eJzs3TFoM2UcBvDnLomf/b4gVRdBUEFEtFDqJrjURaEgpYgIKlREXJRWqC1urZOLg84qnVyKuFkdpUtxUQSnqh3qImhxsDjoELlcK9VGFFNz8t3vB5fcJe97//e4e95kOS5Aa00nmU/SSTKTpJekON/grnqZPt3cntpfTgaDx38shu3q7dpZv2tJtpI8mGSvLPJiN9nYffro54NH731jvXfPe7tPTU30IE8dHx0+dvLu4usfLjyw8fmX3y8WmU//D8d1+YoRn3WL5Jb/otj/RNFtegT8E0uvfvBVlftbk9w9zH8vZeqT9+baDXu93P/OX/V964cvbp/kWIHLNxj0qt/ArQHQOmWSfopyNkm9Xpazs/V/+K87V8uXVtdemXlhdX3l+aZnKuCy9JPDRz6+8tG1P+X/u06df+D6VeX/iaWdb6r1k07TowEmqcr/zLOb90X+oXXkH9pL/qG95B/aS/6hveQf2kv+ob3kH9pL/qG95B/a63z+AYB2GVxp+g5koClNzz8AAAAAAAAAAAAAAAAAAMBF21P7y2fLpGp++nZy/HCS7qj6neHziJMbh69XfyqqZr8r6m5jeebOMXcwpvcbvvv6pm+brf/ZHc3W31xJtl5LMtftXrz+itPr79+7+W++7z03ZoExPfRks/V/3Wm2/sJB8kk1/8yNmn/K3DZ8Hz3/9KvzN2b9l38ZcwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABMzG8BAAD//8n0bSk=") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64fbec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64fbec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) sendfile(r1, r2, &(0x7f0000000000)=0x200, 0x6) r3 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r4, &(0x7f0000000740)='foo', 0x3) 12:48:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64fbec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64fbec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) sendfile(r1, r2, &(0x7f0000000000)=0x200, 0x6) r3 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r4, &(0x7f0000000740)='foo', 0x3) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") (async) openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) (async) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64fbec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64fbec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) (async) sendfile(r1, r2, &(0x7f0000000000)=0x200, 0x6) (async) openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) (async) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) (async) write(r4, &(0x7f0000000740)='foo', 0x3) (async) 12:48:10 executing program 4: bpf$PROG_BIND_MAP(0x1d, 0x0, 0x0) [ 3025.152097][ T3870] netlink: 200 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3025.178026][ T3870] (null): rxe_set_mtu: Set mtu to 1024 [ 3025.178094][ T3870] rdma_rxe: rxe_newlink: failed to add team0 [ 3025.178094][ T3870] 12:48:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000100)=ANY=[], &(0x7f0000000000)=""/214, 0x4a, 0xd6, 0x1}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x7, 0x4, 0x0, 0x3, 0x20084, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x0, @perf_config_ext={0x1, 0x14b7f937}, 0x84000, 0x3, 0x0, 0x1, 0x7fff, 0x4f9, 0x8000, 0x0, 0x99}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x8) r0 = perf_event_open(0x0, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={0xffffffffffffffff, 0xfffffffd}, 0xc) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000745c0)={0x5af, [], 0x81, "7464fbe08eb369"}) r1 = socket$unix(0x1, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000ac0)) syz_clone(0x74809480, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 12:48:11 executing program 4: bpf$PROG_BIND_MAP(0x1d, 0x0, 0x0) 12:48:11 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0001000003140900000000000000df250900020073797a32000000000800410072786500140033007465616d30"], 0x100}}, 0x0) 12:48:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") (async) r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64fbec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64fbec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) sendfile(r1, r2, &(0x7f0000000000)=0x200, 0x6) (async) r3 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) r4 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r4, &(0x7f0000000740)='foo', 0x3) 12:48:11 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_snmp6\x00') getdents(r0, &(0x7f0000000200)=""/44, 0x2c) getdents(r0, 0x0, 0x18) [ 3025.564782][ T3890] netlink: 200 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3025.574210][ T3890] (null): rxe_set_mtu: Set mtu to 1024 [ 3025.574324][ T3890] rdma_rxe: rxe_newlink: failed to add team0 [ 3025.574324][ T3890] 12:48:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_snmp6\x00') getdents(r0, &(0x7f0000000200)=""/44, 0x2c) getdents(r0, 0x0, 0x18) 12:48:17 executing program 4: bpf$PROG_BIND_MAP(0x1d, 0x0, 0x0) 12:48:17 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0001000003140900000000000000df250900020073797a32000000000800410072786500140033007465616d30"], 0x100}}, 0x0) 12:48:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB=' '], 0x0, 0x236, &(0x7f0000000300)="$eJzs3TFoM2UcBvDnLomf/b4gVRdBUEFEtFDqJrjURaEgpYgIKlREXJRWqC1urZOLg84qnVyKuFkdpUtxUQSnqh3qImhxsDjoELlcK9VGFFNz8t3vB5fcJe97//e4e95kOS5Aa00nmU/SSTKTpJekON/grnqZPt3cntpfTgaDx38shu3q7dpZv2tJtpI8mGSvLPJiN9nYffro54NH731jvXfPe7tPTU30IE8dHx0+dvLu4usfLjyw8fmX3y8WmU//D8d1+YoRn3WL5Jb/otj/RNFtegT8E0uvfvBVlftbk9w9zH8vZeqT9+baDXu93P/OX/V964cvbp/kWIHLNxj0qt/ArQHQOmWSfopyNkm9Xpazs/V/+K87V8uXVtdemXlhdX3l+aZnKuCy9JPDRz6+8tG1P+X/u06df+D6VeX/iaWdb6r1k07TowEmqcr/zLOb90X+oXXkH9pL/qG95B/aS/6hveQf2kv+ob3kH9pL/qG95B/a63z+AYB2GVxp+g5koClNzz8AAAAAAAAAAAAAAAAAAMBF21P7y2fLpGp++nZy/HCS7qj6neHziJMbh69XfyqqZr8r6m5jeebOMXcwpvcbvvv6pm+brf/ZHc3W31xJtl5LMtftXrz+itPr79+7+W++7z03ZoExPfRks/V/3Wm2/sJB8kk1/8yNmn/K3DZ8Hz3/9KvzN2b9l38ZcwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABMzG8BAAD//8n0bSk=") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) 12:48:17 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='veno\x00', 0x5) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) ftruncate(r2, 0x200002) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0x4008662c, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 12:48:17 executing program 0: set_mempolicy(0x3, &(0x7f0000000080)=0x5, 0x3b5) syslog(0x2, &(0x7f00000013c0)=""/4096, 0x1003) 12:48:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_snmp6\x00') getdents(r0, &(0x7f0000000200)=""/44, 0x2c) getdents(r0, 0x0, 0x18) 12:48:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB=' '], 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB=' '], 0x0, 0x236, &(0x7f0000000300)="$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") (async) openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) (async) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) (async) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) (async) write(r2, &(0x7f0000000740)='foo', 0x3) (async) 12:48:17 executing program 4: bpf$PROG_BIND_MAP(0x1d, 0x0, 0x0) 12:48:17 executing program 0: set_mempolicy(0x3, &(0x7f0000000080)=0x5, 0x3b5) syslog(0x2, &(0x7f00000013c0)=""/4096, 0x1003) 12:48:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_snmp6\x00') getdents(r0, &(0x7f0000000200)=""/44, 0x2c) getdents(r0, 0x0, 0x18) 12:48:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB=' '], 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB=' '], 0x0, 0x236, &(0x7f0000000300)="$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") (async) openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) (async) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) (async) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) (async) write(r2, &(0x7f0000000740)='foo', 0x3) (async) 12:48:17 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f00000009c0)=ANY=[@ANYBLOB="850000002e0000005d0000000000000095000000000000006884d1d9fe4c9ce4c8b7a8e93bb97683352daddb85d8965f40a937d185319dc353a5b7b7bf0365836f54ae60375c46827cb4d9f8a15bddba79096be7d495c19b3afaa67d2aea409ea69c67cc026d1f0d509b006687c4207b1bf6b3346408ecc4881bcad031b1249592ccc129485120730762afd7006f54bd541f8be0902162f15e7539ad6623a985526464b4539a3c1d1514fe832e9c47f1c53ca2614ff09cffffff7f8bf0299a86746c75adf63fe215c2b2ca38e4f62f682ef561ee6352c07f000000000000008f31663bd222d47fd495ad27124c6b0ccd413b1435b3dbbe4674eb2b31bb3d0bb8aebfc7ee253e10d04a9e555df0c100e80c53d628404a"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffdfd}, 0x48) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtfilter={0x78, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xfff3}}, [@filter_kind_options=@f_bpf={{0x8}, {0x4c, 0x2, [@TCA_BPF_POLICE={0x40, 0x2, [@TCA_POLICE_TBF={0x3c}]}, @TCA_BPF_FD={0x8, 0x6, r5}]}}]}, 0x78}}, 0x0) 12:48:17 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) getgroups(0x0, 0x0) 12:48:17 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_service_time\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0x8) bpf$LINK_DETACH(0x22, &(0x7f0000000240)=r1, 0x4) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x1ff) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5530, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x2000000000000, 0x5}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000680)={0x3, 0x80, 0x80, 0x65, 0x1, 0x9, 0x0, 0x8, 0x14, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9aa, 0x0, @perf_bp={&(0x7f0000000240), 0x3}, 0x12, 0x7776, 0xff, 0x5, 0x3, 0x3, 0x200, 0x0, 0x0, 0x0, 0xb8c6}, 0x0, 0xa, r3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000280)=0x3) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x8, 0x20, 0x15, 0x1, 0x0, 0x2000, 0x184, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0xf08}, 0xe404, 0x8, 0x4, 0x9, 0x3f, 0x7, 0xfb58, 0x0, 0x4, 0x0, 0xffffffffffffffff}, r2, 0x7, 0xffffffffffffffff, 0x3) gettid() perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0xd) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x7, 0x6, 0x6, 0x8, 0x0, 0xfc9, 0x8200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f00000000c0), 0x5}, 0x8020, 0x8, 0x0, 0x4, 0x2, 0x4, 0xfff, 0x0, 0x8e, 0x0, 0x8324}, 0x0, 0xffffffffffffffff, r4, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0xa, 0x8, 0x0, 0x2e, 0x2, 0xffffffffffffffff, 0x1c}, 0x48) r5 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb4, 0x7f}, 0x48) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r5}, @generic={0x34, 0x8, 0x0, 0x0, 0x25}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000001240)={r6, 0x0, 0x0}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r8 = perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x2, 0x44, 0x1, 0x8, 0x0, 0x9, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000002c0), 0x3}, 0x5802, 0x4, 0x8, 0x2, 0xa, 0x2, 0x8, 0x0, 0x7, 0x0, 0x9ca}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40082404, &(0x7f0000000540)=0x7) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000440)={r6, r7}, 0x10) [ 3031.809866][ T3909] netlink: 200 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3031.823420][ T3909] (null): rxe_set_mtu: Set mtu to 1024 [ 3031.823635][ T3909] rdma_rxe: rxe_newlink: failed to add team0 [ 3031.823635][ T3909] 12:48:17 executing program 5: r0 = timerfd_create(0x8, 0x80800) timerfd_settime(r0, 0x1, &(0x7f00000000c0)={{0x0, 0x3938700}, {0x0, 0x3938700}}, &(0x7f0000000100)) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080), 0x1a34c0, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r1, 0x4, &(0x7f0000000000)='/-\x00', &(0x7f0000000040)='mnt\x00', r3) r4 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r4, &(0x7f0000000740)='foo', 0x3) [ 3031.888682][ T3930] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 12:48:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="4400000012001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012800b00010067726574617000000c00028008000100", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x44}}, 0x0) 12:48:23 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') lseek(r0, 0x12c, 0x0) 12:48:23 executing program 1: setresuid(0x0, 0xee01, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0xfffffffffffffbff}) 12:48:23 executing program 5: timerfd_create(0x8, 0x80800) (async) r0 = timerfd_create(0x8, 0x80800) timerfd_settime(r0, 0x1, &(0x7f00000000c0)={{0x0, 0x3938700}, {0x0, 0x3938700}}, &(0x7f0000000100)) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) (async) r2 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080), 0x1a34c0, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r1, 0x4, &(0x7f0000000000)='/-\x00', &(0x7f0000000040)='mnt\x00', r3) openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) (async) r4 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r4, &(0x7f0000000740)='foo', 0x3) 12:48:23 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffdfd}, 0x48) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtfilter={0x78, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xfff3}}, [@filter_kind_options=@f_bpf={{0x8}, {0x4c, 0x2, [@TCA_BPF_POLICE={0x40, 0x2, [@TCA_POLICE_TBF={0x3c}]}, @TCA_BPF_FD={0x8, 0x6, r5}]}}]}, 0x78}}, 0x0) 12:48:23 executing program 0: set_mempolicy(0x3, &(0x7f0000000080)=0x5, 0x3b5) syslog(0x2, &(0x7f00000013c0)=""/4096, 0x1003) 12:48:23 executing program 5: r0 = timerfd_create(0x8, 0x80800) timerfd_settime(r0, 0x1, &(0x7f00000000c0)={{0x0, 0x3938700}, {0x0, 0x3938700}}, &(0x7f0000000100)) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$eJzs3TFoM2UcBvDnLomf/b4gVRdBUEFEtFDqJrjURaEgpYgIKlREXJRWqC1urZOLg84qnVyKuFkdpUtxUQSnqh3qImhxsDjoELlcK9VGFFNz8t3vB5fcJe97//e4e95kOS5Aa00nmU/SSTKTpJekON/grnqZPt3cntpfTgaDx38shu3q7dpZv2tJtpI8mGSvLPJiN9nYffro54NH731jvXfPe7tPTU30IE8dHx0+dvLu4usfLjyw8fmX3y8WmU//D8d1+YoRn3WL5Jb/otj/RNFtegT8E0uvfvBVlftbk9w9zH8vZeqT9+baDXu93P/OX/V964cvbp/kWIHLNxj0qt/ArQHQOmWSfopyNkm9Xpazs/V/+K87V8uXVtdemXlhdX3l+aZnKuCy9JPDRz6+8tG1P+X/u06df+D6VeX/iaWdb6r1k07TowEmqcr/zLOb90X+oXXkH9pL/qG95B/aS/6hveQf2kv+ob3kH9pL/qG95B/a63z+AYB2GVxp+g5koClNzz8AAAAAAAAAAAAAAAAAAMBF21P7y2fLpGp++nZy/HCS7qj6neHziJMbh69XfyqqZr8r6m5jeebOMXcwpvcbvvv6pm+brf/ZHc3W31xJtl5LMtftXrz+itPr79+7+W++7z03ZoExPfRks/V/3Wm2/sJB8kk1/8yNmn/K3DZ8Hz3/9KvzN2b9l38ZcwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABMzG8BAAD//8n0bSk=") r1 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080), 0x1a34c0, 0x0) (async) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080), 0x1a34c0, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r1, 0x4, &(0x7f0000000000)='/-\x00', &(0x7f0000000040)='mnt\x00', r3) (async) fsconfig$FSCONFIG_SET_PATH_EMPTY(r1, 0x4, &(0x7f0000000000)='/-\x00', &(0x7f0000000040)='mnt\x00', r3) r4 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r4, &(0x7f0000000740)='foo', 0x3) (async) write(r4, &(0x7f0000000740)='foo', 0x3) 12:48:23 executing program 2: perf_event_open(&(0x7f0000000700)={0x2, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x20a01) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000440)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0}) 12:48:23 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') lseek(r0, 0x12c, 0x0) 12:48:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="11764492d10f0e40633e6b363a6f1e6343d5289dbf349118d448f4a99d1369a65f6bbb79d3e829fff4d307ab64f2ffa014d026bdccb5ee4c1b22340a24e52f42286db6783357ab8a09c8dcbb2053008f1237f15f6e7ba08b670e871036d90f8e9623ba"], 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)=ANY=[@ANYBLOB="02000000000000000000000000000000000000000000000000000000000000000040000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f40"]) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) 12:48:23 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') lseek(r0, 0x12c, 0x0) 12:48:23 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') lseek(r0, 0x12c, 0x0) 12:48:23 executing program 2: ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) set_mempolicy(0x1, &(0x7f0000000140)=0x3, 0xab) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) mkdir(0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0xffffffffffffffff, r1) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100)={0x0, "508f1698206b03af530cdf1cfebe11c7412579dcf7be32e117eac5e68d64b9fb98205670e1f32490956b07f9052d0cf1a8599b75ddff9d50e0a2cc2046735fbf"}, 0x48, 0xfffffffffffffffe) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) 12:48:23 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f00000009c0)=ANY=[@ANYBLOB="850000002e0000005d0000000000000095000000000000006884d1d9fe4c9ce4c8b7a8e93bb97683352daddb85d8965f40a937d185319dc353a5b7b7bf0365836f54ae60375c46827cb4d9f8a15bddba79096be7d495c19b3afaa67d2aea409ea69c67cc026d1f0d509b006687c4207b1bf6b3346408ecc4881bcad031b1249592ccc129485120730762afd7006f54bd541f8be0902162f15e7539ad6623a985526464b4539a3c1d1514fe832e9c47f1c53ca2614ff09cffffff7f8bf0299a86746c75adf63fe215c2b2ca38e4f62f682ef561ee6352c07f000000000000008f31663bd222d47fd495ad27124c6b0ccd413b1435b3dbbe4674eb2b31bb3d0bb8aebfc7ee253e10d04a9e555df0c100e80c53d628404a"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffdfd}, 0x48) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtfilter={0x78, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xfff3}}, [@filter_kind_options=@f_bpf={{0x8}, {0x4c, 0x2, [@TCA_BPF_POLICE={0x40, 0x2, [@TCA_POLICE_TBF={0x3c}]}, @TCA_BPF_FD={0x8, 0x6, r5}]}}]}, 0x78}}, 0x0) [ 3038.069776][ T3958] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3038.138770][ T3977] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 12:48:30 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x8, 0x4, 0x4, 0x9}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f0000000300), 0x20000000}, 0x20) 12:48:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="11764492d10f0e40633e6b363a6f1e6343d5289dbf349118d448f4a99d1369a65f6bbb79d3e829fff4d307ab64f2ffa014d026bdccb5ee4c1b22340a24e52f42286db6783357ab8a09c8dcbb2053008f1237f15f6e7ba08b670e871036d90f8e9623ba"], 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)=ANY=[@ANYBLOB="02000000000000000000000000000000000000000000000000000000000000000040000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f40"]) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) 12:48:30 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@bridge_delneigh={0x30, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x2}, [@NDA_LLADDR={0xa, 0x2, @dev}, @NDA_FLAGS_EXT={0x8}]}, 0x30}}, 0x0) 12:48:30 executing program 2: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000001c0)={'tunl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @empty}}}}) 12:48:30 executing program 0: set_mempolicy(0x3, &(0x7f0000000080)=0x5, 0x3b5) syslog(0x2, &(0x7f00000013c0)=""/4096, 0x1003) 12:48:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffdfd}, 0x48) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtfilter={0x78, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xfff3}}, [@filter_kind_options=@f_bpf={{0x8}, {0x4c, 0x2, [@TCA_BPF_POLICE={0x40, 0x2, [@TCA_POLICE_TBF={0x3c}]}, @TCA_BPF_FD={0x8, 0x6, r5}]}}]}, 0x78}}, 0x0) 12:48:30 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)={0x2, 0x2, 0x0, 0x2, 0x12, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x6}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}, @sadb_lifetime={0x4, 0x8, 0x2}]}, 0x90}}, 0x0) 12:48:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="11764492d10f0e40633e6b363a6f1e6343d5289dbf349118d448f4a99d1369a65f6bbb79d3e829fff4d307ab64f2ffa014d026bdccb5ee4c1b22340a24e52f42286db6783357ab8a09c8dcbb2053008f1237f15f6e7ba08b670e871036d90f8e9623ba"], 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)=ANY=[@ANYBLOB="02000000000000000000000000000000000000000000000000000000000000000040000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f40"]) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) (async) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) 12:48:30 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0), 0x1a1842, 0x0) write$vga_arbiter(r0, &(0x7f0000000040)=@other={'decodes', ' ', 'io+mem'}, 0x8) 12:48:30 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)={0x2, 0x2, 0x0, 0x2, 0x12, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x6}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}, @sadb_lifetime={0x4, 0x8, 0x2}]}, 0x90}}, 0x0) 12:48:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) bind$x25(r0, &(0x7f0000000000)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) 12:48:30 executing program 3: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x14}, 0x18) [ 3044.311772][ T3988] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 12:48:33 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f0000000500)=""/36, 0x24}], 0x1) write$P9_RREMOVE(r1, &(0x7f0000000040)={0x7}, 0x7) 12:48:33 executing program 2: syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000240)=ANY=[], 0x21, 0x4ae, &(0x7f0000000f00)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000834c0000000000000000000000000000000000000000000000000000fa0061233d0ab81bd5a272720056b4e048622b460405c6df101e7060be7e57e65fc829944265ea90fb44571f228d0d66423306c12a76b03d75581cee8878a85dc9efd690d18f5b66ee3b0246fa90d286351ab78a77330f7311eebf3849bc278a038b87b58b86c907963b8203b4531b2f2b0e3ffb86af63dcb4171e9b1d114f37b4385c915a4fa0f2bf81860a0df4d37082e98e0a10f49d1d2193d4002bbb5893f6"], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xfd, 0x0, &(0x7f00000000c0)) 12:48:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) (async) r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) bind$x25(r0, &(0x7f0000000000)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) (async) bind$x25(r0, &(0x7f0000000000)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) (async) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) 12:48:33 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)={0x2, 0x2, 0x0, 0x2, 0x12, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x6}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}, @sadb_lifetime={0x4, 0x8, 0x2}]}, 0x90}}, 0x0) 12:48:33 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR(r0, 0x114, 0x7, 0x0, 0x0) 12:48:33 executing program 0: r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xac \xe8\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6)\x9f\x9cR\xae\x12G\xd8\xa4y\xef\x02?\xf2\xe7}\ra\x97F', 0x0) r1 = dup(r0) write$cgroup_pid(r1, &(0x7f0000000040)=0xffffffffffffffff, 0x12) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) sendfile(r0, r1, &(0x7f0000000100), 0x6c03) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x82, 0x0, &(0x7f0000000140)) 12:48:33 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)={0x2, 0x2, 0x0, 0x2, 0x12, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x6}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}, @sadb_lifetime={0x4, 0x8, 0x2}]}, 0x90}}, 0x0) 12:48:33 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) kexec_load(0x0, 0x10, &(0x7f0000000000)=[{0x0, 0x0, 0x14e222000}], 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 12:48:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) bind$x25(r0, &(0x7f0000000000)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) 12:48:33 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000580)="f80c13fce2c692fd83336390ade37dd4", 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) dup2(r1, r0) 12:48:33 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x60, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x34, 0x2, [@TCA_TBF_PARMS={0x28}, @TCA_TBF_BURST={0x8, 0x6, 0x58}]}}]}, 0x60}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@gettclass={0x24, 0x25, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}}}, 0x24}}, 0x0) 12:48:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext3\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00507bc278a2abd446ce98d98877c9456a32119aacb80428d8961a336f9f9dcd040d55b5013405919f6756a28842b134a55c67c1547d2503"], 0x0, 0x236, &(0x7f0000000780)="$eJzs3TFoM2UcBvDnLomf/b4gVRdBUEFEtFDqJrjURaEgpYgIKlREXJRWqC1urZOLg84qnVyKuFkdpUtxUQSnqh3qImhxsDjoELlcK9VGFFNz8t3vB5fcJe97//e4e95kOS5Aa00nmU/SSTKTpJekON/grnqZPt3cntpfTgaDx38shu3q7dpZv2tJtpI8mGSvLPJiN9nYffro54NH731jvXfPe7tPTU30IE8dHx0+dvLu4usfLjyw8fmX3y8WmU//D8d1+YoRn3WL5Jb/otj/RNFtegT8E0uvfvBVlftbk9w9zH8vZeqT9+baDXu93P/OX/V964cvbp/kWIHLNxj0qt/ArQHQOmWSfopyNkm9Xpazs/V/+K87V8uXVtdemXlhdX3l+aZnKuCy9JPDRz6+8tG1P+X/u06df+D6VeX/iaWdb6r1k07TowEmqcr/zLOb90X+oXXkH9pL/qG95B/aS/6hveQf2kv+ob3kH9pL/qG95B/a63z+AYB2GVxp+g5koClNzz8AAAAAAAAAAAAAAAAAAMBF21P7y2fLpGp++nZy/HCS7qj6neHziJMbh69XfyqqZr8r6m5jeebOMXcwpvcbvvv6pm+brf/ZHc3W31xJtl5LMtftXrz+itPr79+7+W++7z03ZoExPfRks/V/3Wm2/sJB8kk1/8yNmn/K3DZ8Hz3/9KvzN2b9l38ZcwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABMzG8BAAD//8n0bSk=") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r3, 0xc038943b, &(0x7f0000000080)={0x7, 0x40, '\x00', 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) [ 3047.389762][ T4030] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3047.410628][ T4030] sch_tbf: burst 88 is lower than device veth69 mtu (1514) ! 12:48:39 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f0000000500)=""/36, 0x24}], 0x1) write$P9_RREMOVE(r1, &(0x7f0000000040)={0x7}, 0x7) 12:48:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext3\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00507bc278a2abd446ce98d98877c9456a32119aacb80428d8961a336f9f9dcd040d55b5013405919f6756a28842b134a55c67c1547d2503"], 0x0, 0x236, &(0x7f0000000780)="$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") (async) r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r3, 0xc038943b, &(0x7f0000000080)={0x7, 0x40, '\x00', 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 12:48:39 executing program 2: r0 = socket(0x2c, 0x3, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000040)=0x3, 0x4) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x17be1b}) epoll_pwait2(r1, &(0x7f00000005c0)=[{}], 0x1, 0x0, 0x0, 0x0) 12:48:39 executing program 0: r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xac \xe8\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6)\x9f\x9cR\xae\x12G\xd8\xa4y\xef\x02?\xf2\xe7}\ra\x97F', 0x0) r1 = dup(r0) write$cgroup_pid(r1, &(0x7f0000000040)=0xffffffffffffffff, 0x12) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) sendfile(r0, r1, &(0x7f0000000100), 0x6c03) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x82, 0x0, &(0x7f0000000140)) 12:48:39 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000400)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1b8, 0x150, 0x150, 0x11, 0x0, 0x2d8, 0x238, 0x238, 0x2d8, 0x238, 0x3, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @mcast1, [], [], 'veth0_to_bridge\x00', 'ip6gre0\x00'}, 0x0, 0x150, 0x1b8, 0x2e, {}, [@common=@inet=@hashlimit1={{0x58}, {'bridge0\x00', {0x0, 0x0, 0x0, 0x9000000, 0x0, 0x10001, 0x6}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz0\x00'}}}, {{@ipv6={@private0, @empty, [], [], 'ip6gretap0\x00', 'wg2\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@unspec=@CONNSECMARK={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) 12:48:39 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x7b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @empty}], 0x1c) 12:48:39 executing program 2: r0 = socket(0x2c, 0x3, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000040)=0x3, 0x4) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x17be1b}) epoll_pwait2(r1, &(0x7f00000005c0)=[{}], 0x1, 0x0, 0x0, 0x0) 12:48:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="005ab15a60b5015769074e7bb43fa6e77a3443162e4c59ad91293ef122ebc0ad412c38d50c5f274c0f7ad47a3d5fdb5e8d4dcab43b84e0b2623cf1cfcb1aa6acc2f8336d3ee036642bb9c8e9a909f76a4fa8d60c160f35325b24ba8772d6e2b759aaf4a3e354b68f227b3a318f68b19beb1368bb44e2ad79749718bbdb1d2973a02853602dac5d7936977d1b500a1df3f8384943e4dbf907237d94c850c3342d55b1e83e88d48eb11d600f09de88e09ec6f8d3bd069d3a"], 0x1, 0x749, &(0x7f0000000840)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0xfea7) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfff}) 12:48:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext3\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00507bc278a2abd446ce98d98877c9456a32119aacb80428d8961a336f9f9dcd040d55b5013405919f6756a28842b134a55c67c1547d2503"], 0x0, 0x236, &(0x7f0000000780)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r3, 0xc038943b, &(0x7f0000000080)={0x7, 0x40, '\x00', 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) (async) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r3, 0xc038943b, &(0x7f0000000080)={0x7, 0x40, '\x00', 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 12:48:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000dc0)={0x64, 0x2, 0x6, 0x1, 0x0, 0x500, {}, [@IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @private1}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x64}}, 0x0) 12:48:39 executing program 2: r0 = socket(0x2c, 0x3, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000040)=0x3, 0x4) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x17be1b}) epoll_pwait2(r1, &(0x7f00000005c0)=[{}], 0x1, 0x0, 0x0, 0x0) 12:48:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x1, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64fbec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) write(r2, &(0x7f0000001780)="6d5903664080fa80bba3e5b10dfb02a990fd636d5ce4ca7225f7ff09912c3e7933dcfaf92d02368761587bca36b91d8ed7c290d4d60882d6bbacbdc37dfec7b8a06c16a1f487c02921bf8d02d2d11bc3a0978f4b7c2e2afd681bffffbb86e1ab10efa09fffb81780580b34e2b47b1224051a7a642c3b6a6a5a78348cb7e352d3207643d1a2f20b3cf7540cd80eb9f3f03f223a0a449e393573cb0d5400f21ace39ab0258a75b1037902702c326f5faed1d42a9dbbb447c543a3e04fd7ac021e3b31d11", 0xc3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) write(r3, &(0x7f0000000780)="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", 0x1000) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000380)=0x20) ioctl$FS_IOC_SETFLAGS(r4, 0x6611, 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0xff, 0x6, 0x7f, 0x20, 0x0, 0x12f6, 0x4000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x4, @perf_bp={&(0x7f0000000040), 0x4}, 0x1, 0x8, 0xff, 0x7, 0x1, 0xfff, 0x5, 0x0, 0x3a77, 0x0, 0x8}, 0x0, 0x2, r4, 0x8) [ 3053.559199][ T4041] xt_hashlimit: size too large, truncated to 1048576 [ 3053.565948][ T4041] xt_hashlimit: overflow, try lower: 0/0 12:48:39 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x1, 0x178, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/376]}, 0x1f0) 12:48:46 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f0000000500)=""/36, 0x24}], 0x1) write$P9_RREMOVE(r1, &(0x7f0000000040)={0x7}, 0x7) 12:48:46 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x63, 0x11, 0x23}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) 12:48:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x1, 0x236, &(0x7f0000000300)="$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") (async) r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) (async) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64fbec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) write(r2, &(0x7f0000001780)="6d5903664080fa80bba3e5b10dfb02a990fd636d5ce4ca7225f7ff09912c3e7933dcfaf92d02368761587bca36b91d8ed7c290d4d60882d6bbacbdc37dfec7b8a06c16a1f487c02921bf8d02d2d11bc3a0978f4b7c2e2afd681bffffbb86e1ab10efa09fffb81780580b34e2b47b1224051a7a642c3b6a6a5a78348cb7e352d3207643d1a2f20b3cf7540cd80eb9f3f03f223a0a449e393573cb0d5400f21ace39ab0258a75b1037902702c326f5faed1d42a9dbbb447c543a3e04fd7ac021e3b31d11", 0xc3) (async, rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) (async, rerun: 32) write(r3, &(0x7f0000000780)="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", 0x1000) (async) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000380)=0x20) ioctl$FS_IOC_SETFLAGS(r4, 0x6611, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0xff, 0x6, 0x7f, 0x20, 0x0, 0x12f6, 0x4000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x4, @perf_bp={&(0x7f0000000040), 0x4}, 0x1, 0x8, 0xff, 0x7, 0x1, 0xfff, 0x5, 0x0, 0x3a77, 0x0, 0x8}, 0x0, 0x2, r4, 0x8) 12:48:46 executing program 2: r0 = socket(0x2c, 0x3, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000040)=0x3, 0x4) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x17be1b}) epoll_pwait2(r1, &(0x7f00000005c0)=[{}], 0x1, 0x0, 0x0, 0x0) 12:48:46 executing program 0: r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xac \xe8\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6)\x9f\x9cR\xae\x12G\xd8\xa4y\xef\x02?\xf2\xe7}\ra\x97F', 0x0) r1 = dup(r0) write$cgroup_pid(r1, &(0x7f0000000040)=0xffffffffffffffff, 0x12) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) sendfile(r0, r1, &(0x7f0000000100), 0x6c03) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x82, 0x0, &(0x7f0000000140)) 12:48:46 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x1, 0x178, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/376]}, 0x1f0) 12:48:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'nicvf0\x00', {0x2, 0x0, @private=0xa010103}}) 12:48:46 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x1, 0x178, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/376]}, 0x1f0) 12:48:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x1, 0x236, &(0x7f0000000300)="$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") (async) r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f0000000740)='foo', 0x3) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64fbec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) write(r2, &(0x7f0000001780)="6d5903664080fa80bba3e5b10dfb02a990fd636d5ce4ca7225f7ff09912c3e7933dcfaf92d02368761587bca36b91d8ed7c290d4d60882d6bbacbdc37dfec7b8a06c16a1f487c02921bf8d02d2d11bc3a0978f4b7c2e2afd681bffffbb86e1ab10efa09fffb81780580b34e2b47b1224051a7a642c3b6a6a5a78348cb7e352d3207643d1a2f20b3cf7540cd80eb9f3f03f223a0a449e393573cb0d5400f21ace39ab0258a75b1037902702c326f5faed1d42a9dbbb447c543a3e04fd7ac021e3b31d11", 0xc3) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) (async) write(r3, &(0x7f0000000780)="2b6baa428158ee780e27744f5cf439e683a6950cff04f877aef69669e883008a55eddd637b304b2d12350cb845e51ef1b91b0cfa2d415de386f85ee84c2045e31f2be418f293ef6592c55e1b5d7c221a4121f8914162f5db2d6fa165ba680aae7f4a3a2fab73990a12b71ae8f7324f14679b1c1030da89169086b0a38c611c99a7a31c84172da140d47791d07ab8a7ca2f8b5f2a63273284636c6583b3f0068fdea68e9068664792512b004d7402eaceaa937844650dc56138bec07d91936b2deb74a068a34509e2c4783d459e15e311c1bff6fd9dff0e21d9ce145798d1e9f8d654051b9dac57f4c3bb5ae0fdb25e6e5283444c80964f1754f55b3bebed3ee153ff1a87ef0c682bcb2bff29c5c073aba37402822054be25a31912114e5da30b0f5f1f08657e5d88b1a5dd2e5fcd758a6e9631dfe9dc16f70561bdc5c4914f9b348742f2f15c3fd71bd96f1c84657c4e9d1533d6357a2fd3e50cfd291ac81278044bb6018bb9bfd93878862fe34a540790de64996246dc199cc30b06998e208ff9016d8363afcaae2b32d484c26c78b32d00fbbec38742d78fc22beeb30b7ae540bf36a69dbf0a876cb33f21720d47b49b68ceaa694a3a0a98e1171a56b287b81de5b331dda61adc3d7079255677c5c1f4efaef82b61b02dc9c66e66f0ff96d1fe1e854dfcacf9a5832767e755552e37a65042680f10d196ecad69dda797d899f97764cccb337da563651d4e6a2c221e25b7553abc6d9ae0debad5b34c943c7d602aeb9b1ecbc82184b14bbec98c4cf2fea31932a998d73b2bbc1b85de98a87d520887cd2139bcf7d916aa02cc74df88fcb8cef9a7634ef832fe7b4b363797a7b94758b42e24f33efb595c5a1d54af961f9a58b50684316dd0cee26eb3e4d5aaf46e42dfcaae73ee4fa87b50ebb77fd9aa05fb9ac4c09250a78a1a20a5074f97de1219ed51b3edd49ceede886ad626bc0739517708939b38f60e18fa897dbbc6ffd598791e02554dc1b3ca0f4da6c6ee5339f6e30c67bdab63ee13068673116c641073c525cca184a55a96e91f97cac55d5e49e8752e305c11e9ab1bd75ce40cde34e0aacf56a223c1edfbdedf9165822d72bcc9d99095b56424e3afe1d65a0e92c61ff87fc54f5f591cff74c92fa6fe3c5728899a2deca2f09909e390b385234704beb6df008c9bf6869d19373c07fb0196550764705111ed355296ef0b5533881640bd06108e1a243128410caae33a1cbcc97809ed4996580d6babb7c060bef53ea2bd33630ce213aefd413c296e4340254d2bbce0a579500c6e40e13a52b461ecf8edf60498ae2a17a69f862155edad11e84e688186d3e19a17f8517d4f2a07bd3bdc31c76dd3b17d3efc44de854ca4636ffbc0fa1cf110cdb9639e6e35c0efc0bc5993d716e8dd3772d672ff263e6d60ce374d67a33146d0484af4997d0b859404e7a880b69d0f510a1e281e107f75acdf49f509603b05d9085290664a8267e0a49a70f46dd326de493926a6974efd40be4a592ff31825c883ef745f01a41cc1a5243594d270c957805e39bfeb2b73896ccec7b1967949606344b00fd600726562203be116b4770b83bdc211297beadd51fc2ba0f16dd4f9e574d6482744640757e744d20ecd47a3cc353804b35f610e714c550b9f389f2f33dbdae5a6c14bc8f36f6579d87f8ffa0e3bb4c1c34f6d2fe69f5045fccaaca662dcd71dc90f3406c617725bc0812c3ef5354d00136fc45f73416062353da193ebf2e01a8879bae74239a934e96b9a8c1da51a1e48e0c6eb5b811a2527bd72f85818ddc2970450874d20ea3a3c40202459b3211a568444d60c0c7a43b8adac284b939ce4e50f550d26fd4c4a5722efcfe956f857559dbc5dc3b0022e9fd1c13ae4d0ad3713fc5f7106e417fbb49873bcb1a2873e255f0266aa1a5365f1e459757357ba1dccc95f53333c246ad45866443e42d6169203722f2f3cb0d0977ad85aba65931c1fbc4109d5d0c27a004a89d46daea47c46649b8c90f2153074fe6650865ce8bd27fa6320c5504ce2a795be3c486b18e1e0a858a1d057dfb68ac6b4e190fe460af44b66adedecb0df6020fbd4e76e87ba57e5cbfe7fcf05bcf2188e98e9acf5aebe09ad671da7a56d4549eb9fd4281b4f5dc99f0712ff1a4ead397808ccfedf6dd3a9ccbed85286b2d452d41897de3933b0441639d5b6a1710e1edb381daa3170445d427fb23dd4e716692aea24907121318972c508e6f8693c67efa93287c42e17445e79b6568718167d08341057cfd375815c2ea8544bbb2dfb69bc07a53b044aaaf4074d529a0a03013564949b76ca9d41753f9c294685a6d9326f96cea92098f9e316c99f301ea3bd582194e00c2b6b1cfdff542f00b59325130cc3e10da521632540b1c686e7a13d56e7afbf1cd3e99a83d0ee8d02e35cf0f52180f87beee2530dbbc10b38f66a01d1389e530f7085df28b7aa188da14c341ae049bdb7affebced23e6c3a1148a3abb5acd21b1a80d20171fb373b244a5e4781f7aae0dc111a99292767778f2cd3d34874481c0a3bc40d9b35e2997827c81f837f56efc0342e44add51481261f33a5cd06d6bab44df09bdb5c113a00a25b8fc16dc05aafa9beb71b5feb11ae1d5d6f30c4e4da50d0ede2fbafbd17cafd68975614cee1a66d8c608aa4e938f88fc4d20c36f28bf91888f800013c89553b7af2981f730805bd9f34e9c3ce9749da796a91bc58e26febe5456a7c7cbced0ef65f73df141182028ca8e03e36c2bb44e07e2c4ae4a20330524cad05a052b78cbfbb3c93f69dde89c49eeb70d13f7d63cc3343464570e0df154823df772dccf70425c8c9e326f2f2cc6e8fe876c938decd608888fed3afd1399497e16fbf31513f18a42b7b5dfd9a37140dd7000565ad96420c08b9390ed69694b62e9562d02b9821ec5858a8cb4ef22eec69f0f09f7a37855dfa67d2954e80ee3caac5605047981d2457d63196a4d8d70da5c6680e5531057d13ef85508c43af384b41800c81b4ddfc00b2eba78b6db9d080c81835101aaa20d408621caabee00de60f0059da6d7853e6ea09804efcb0f333ee8afacbce29a4d126952b1e54cb857833552b005973fdba28abc3e431cce0dfe4fe4e44df89a0794c1158ea284f936582f2758b0b8c3e969ea4e6bddf92b1722f5102f79015f4765b5347b2912888be053989eb06e32cb020e77a706d56b4cdd2891808cc964f06daa5edb4c29c63d2e872227b3ffe2cc6a9c935b6139dafb449de3955369d83902d388c87426422f6a72e4b24acf85a1b90682724077240c6d224d98048ababd1895fb129317d998df2cb1562cbe599f9d5d2c2710d632c98d4e6b8f3e35dc9f662e0c278a65ad244e0fab26cacc30d2804bba66b256cd6afb2c0bcd054fd52342cbd276b98f8efb32a40300d2f9e2977c3c8a63aff6cb52277352f8d702a7f3a919e5780eac80d146def3d565b9f87752bc64ed9d5601b6089d172886f9a48d294897cb1c73d6c9de7bffba6ec35ae7f5ae27ed54aa2f48cae7b823a6d07b3311297cd7fa5efa3fe0b848c7dea2835678e5110e6e78aec57454f140345a8af759280d36fc5d7d3318abf880e58406563285cb86a5da2da9a9593c712e95c490168bd0987f2b0935007015af90073317a3e0bc251162dd4f42624920757f03eaf8c81374c7c3b41c7f4af1bedb601758f088c527d87c16600472b99d2c3446e88cd75b3fc15a5448c581647e80c97894554508af98cb421d24a469858beb8cbc65103924d0fdb9b7c1292fc44f24145baece80c199a7552d0a3b9ca77828d98814a590727292c078a92c77cc7aaa472556c38333057f87dd37c7c447e6bd8b366fa8c5282890dbb5cf0866327665bab0bce3c14da6b97be34a62cc006510d09a6d1678d2dc55899038cf845efb2b0eead3aa2e6ba30a923828906505a978f095c0ca97f75a26cf31fac705f6d773352d8116675053ca6b7b82fc8f4678808b9b1748136d0b9f1185d9d1b1ec29f17f2e7b65f6ae92aa432c2b119f8fb0ef4f99cdd75be6379aedbea3da00fa8fa74a06f8706f1a49330f914410ca7e883f5184034e6311519fba44e827996c9d0e01b0851f33bd799c5598e5a816b8e858037a68de0e7cd5dbfaad900956b454118c46c2e783799bf40a26d90ec2334f0ae22df0a9e014d9723f355abc91c865d1c777e541cca149a45c4dc714bbb601574aae5362eb0e98b2a3d6ece3ee8f13168f0c82290e777ff5fad7e2dad66b814b89fc7c8e5a7add35b5ad874d629efa47a84cd7f77a28c8a8a7b0038ac85c61a21fb803b9223d1823dbd9171b65cabfa2ef435224b8344d5bddd8cf11ef8bef7c015f7519e283c32a934af682b7fd09d267814a3e3668183ae7db6c91f457bda5249058f73df10c8ce923e573d87d323346c87edee5c95ee65f6213941a3554199fa42f05a66c78c666283c3c91b0028f958309ced509eb7e49649e2498c802629f173b55b8b3e882d15608fa57a6c01b70a65a24031fdfb32a3c0fd929cc3458fb850ed65b4a3c50108971cbcc9d936763d2b5b6d0b990efd344a71459bdfdacb9534f41808dfb9dec21ce2c923b7f79eba0f45c1283d9dbd0c87a5668797aa0d2f51cbb4dde7438acbc00119f269096a637cbfc4ff3223363c0e923f5dbc6d4d0bdf2676aedba892150dd7b564207a9c8767c87ec27bca00113a1dc624b874bd95feb174de0c42910ace0354365f1a92cbe423766883d3f0dddadc3821c0eda6dd598c31112bda1ca20abf1f0ef83cc8ff83a8662e0fb9fc511b34a7982f622c9079316d53ff02e175929188af2a98a4621bb9656f936e442e925cc820a308e2aaccb1d3ce1a8fd0422355011c2ba81901a7d32034b5d2caffc67a78908960fb43d7db50a3bb9cc72cd1710d4b9747e5ef4f67ef1a57d4ce2549a3b4954dce4eb662118c721594b34bb6b4181f7ccfe5c3e7382fefa2a5036d2c9e5e47a9483f4537e02d8e85fd48860d1d10abd8b07e695dda035e9d37e5f86cac345ef3072c397e0ac1129666168bd7c7aec5aac8e4cb6febe09b49116d6e9659931589951571cd8679585da6076edf6906b756217575b88fa8fccd6bf00f387b7a1c5b17aa6a84c9db243bef2ed952b0f627d64b62744cc12ebdabb6552cdaa734d5192a38593b15dc47b04d779dd2d19153925e6661b2b4b4a239bcd06e76b19a47a6eaae9bc3a9d191923ca2e396bdcca8cdc970f74eb0285541b8fd870b32aa8ce68de12e812ba2310d8474f94704025bb3cddd7331b637f6921192e8562324528d213238df99cea696ce3741f912bec4ce37268f535f722b3a0a2afd2e0040983596c1698932c35e77cfba73ecd218ca49604294e788221b89c8911983afb9d3e15868df56c38ea7239e408d0519760d9569445784db166a21839a60fd1d638e90666e19bf77f4c04517e37a515f7d5b1d285f14b78ebeb6f60aa29f0435f0ae616350c7417d6d90405837b010427dd325b58b271a59c90d47621b3d6b820ea2952347319ac37ffa563ddb6304801b554fa5a19011a9e84811b05ea1aba8f649d84fe455132792c0f4cab7ae71cae7e95249b692cf3a126575931a7dbfceef9d9674a6ca737fd1543f5e6af8362a31a2c9bf7d74d6f759b1faf9e5903dfeac31cde05e46a4af1a26f973972589eed24eeb21935df245096214eaecd99ec14351cdb0e1f341371d8cab0a4c4e522f2c6c305e98793cb977793132cf80ee6572922b44b41a70483bedb840e5728a80eb411bd747a83735dde67be1b", 0x1000) (async) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000380)=0x20) (async) ioctl$FS_IOC_SETFLAGS(r4, 0x6611, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0xff, 0x6, 0x7f, 0x20, 0x0, 0x12f6, 0x4000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x4, @perf_bp={&(0x7f0000000040), 0x4}, 0x1, 0x8, 0xff, 0x7, 0x1, 0xfff, 0x5, 0x0, 0x3a77, 0x0, 0x8}, 0x0, 0x2, r4, 0x8) 12:48:46 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x63, 0x11, 0x23}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) 12:48:46 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000400)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @empty}, @in6={0xa, 0x0, 0x0, @loopback}}}, 0x7ffffffff000) 12:48:46 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x1, 0x178, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/376]}, 0x1f0) 12:48:52 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f0000000500)=""/36, 0x24}], 0x1) write$P9_RREMOVE(r1, &(0x7f0000000040)={0x7}, 0x7) 12:48:52 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x63, 0x11, 0x23}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) 12:48:52 executing program 2: syz_emit_ethernet(0x22, &(0x7f0000000000)={@random="299961efd017", @random="f4eeede5f588", @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x84, 0x0, @rand_addr=0x64010102, @dev}}}}}, 0x0) 12:48:52 executing program 5: r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000002c0)='./file0\x00', 0x800, 0x400, &(0x7f0000001040)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r1) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000680)=[{{&(0x7f0000000300)=@file={0x0, './file0/file0/file0\x00'}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000400)="d5593aac8678973b44e52aefccf45aa952ca4e4d710950c2fbf3b9a6d94262ed51dddc11e9c9ebb03752593d9d451f41793cbbbe85a12c74d094c451f9ec248d4b4ac6ff99a9f369", 0x48}, {&(0x7f0000000dc0)="43ef61b0080002bfc60d643e361f192a3e9d5fc22a3ed7fa968f4af87c6dd9c4c5b662275dac011173f0a3dff6bd10800b8795cc87e07f8b38a0ef3b576b21341375a49f25cafadb31e66344a7f6be7d7c7d01f70f4e94663da98e3f07f75fe84e95b782bb2a462d4cba5dfb9487b3fd0b63e528470d3d0050b713dd1bd1f91a050e630a2ff989ee1576126fff40fd3d99ca0a4620e4d27d5b36ae10506bfc1af42e2b265f34cc58cc360de1ef37ad7a9ae3baf2827139c9cda05e5fff0b790a57d08fcc4001c18159fee0776de091", 0xcf}], 0x2, &(0x7f0000002c40)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="a99e3289d205f4f910a2c5734cf419a0468e0c0145177938f1d8368594002c61702fbf580d867134b1e888b8882fdc6c5a50a2e3fec32728528be39e990b0d2979df6de2201816d17827173a3b608f782791536cd8275d03de8831c51d47a7fe4df78df80a4cab94c97142febaace212b45c9302000000824d9bf8e4f81c0044404ec9ba9cd6292b84e1b6be8e604537f7a836abc0f04cd54c9462f5df9f06a5d1ad66aaf2514c7c94c78c3ab64097c4f01f7b2937009ed1fe0e26326fb136247e3afda5d557b32c52eaef3a95fac67490adb1292eb9c82e17e254b46517f0e4554b4734cfd606dc83647dd033b301000000000000001a27db3e60e1e971e4d188473b3a8499c8b474e8e5a2724e091a36584ce1f2cb5d5692f233bfb303c2a89f31caf60f407bc54dccb40ada430b78886a7f50dc762382b4b60a80cf485f7b4f36c8c5ac3dc8603ffdcb77a1fd63bf9621344f11f43e2fcaf4886a6e9c761e45b1280bfc183325d34965f45dd8831ec3bc46b1e6b9abdd3ff68a9c60352978751cd798571f00008f366050395dfb433db1", @ANYRES64=r2, @ANYRES8, @ANYRES16=0x0, @ANYRES64, @ANYBLOB="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"], 0x40, 0x800}}], 0x1, 0x20004805) mount$9p_tcp(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0), 0x40, &(0x7f0000001240)=ANY=[@ANYBLOB='trans=tcp,port=0x0000000000004e21,debug=0x0000000000000098,mmap,dfltgid=', @ANYRESHEX=r2, @ANYBLOB="1405aee400000096641e20da8723eb7e720d0c8c643dc8e6c0faf748655ae3013688e5236a2c411bef20e98623bbf9bf7a60620e741cca51b62fc4c6", @ANYRESDEC, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB, @ANYRESDEC, @ANYBLOB="5ff9505fa227f81b3e68c4a294b6911bcf7c29677ddfaba1efd72892fa16b399afa5f364047c2bb8db582a8ad052535ce6"]) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000fc0)=[{{&(0x7f0000000400)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000900)=[{&(0x7f0000000480)="70e2263e1e136eaa5f0e28ee10fc0d6afabb08cf2cc43dfc17906489ba88137f2a24008d260aa8a80ef900deb3821df04bb2099cefc167918b03de342b4cf041fc8eb09ea781", 0x46}, {&(0x7f0000000500)="7bfbf4d892350d4dc48d8e2f5bc27a9dfc1a451fcad422214254d79f2731a584c7712c6340b9de836e3ca74ea152919e1524adb97289299d4b5da076eba01f4a34690fa14f12e8f8da21f994c77ce2ed6edaac12e21a86dbedf7ac0993c859f198459c75ebb6ecd521de2132e14446671d2506b7ba0591636545547bdaf42072f1467151491468d06e36bebd4e6a5a2d180aa35f0ba7e5a8197cc4cac42d36238748de75f8abfabd4fb02d1c2259069cd77e1ae693ed36a1188d13d263f831132aefc4a38a9a0d6cbe60dab84d624655e6daf516a82612774373a3d453684b339fd5cdb3fd1d4346", 0xe8}, {&(0x7f0000000100)}, {&(0x7f0000000600)="392071c56edaa60e38ed257aaff50f536a52a23729d8362821c583382e366f2ff30ee1910cc99983b6dbe63b9f82b23de98dd12edde59169625400d8b9212c176dd6634a5929c07e3a06aca8d08ca8590a581e02e7565169e77075a07ae4fc164aeeff65a6aeb63511665f7dd5f331dbe88de35e94254c2908d713fbd62399878844590092e9b71b8f02f94184fb1effac3454d317113ccf1d0b87fd962e94b678a777c6aed9d2849be7b7d450f1", 0xae}, {&(0x7f00000006c0)="b0d3399763549d79f71e922b52498df50f6c787cdc97434cebb3b2793bcd4d34285ad895e0d10d27623c752bfe4db75314c3bfbf09dab6e270e4b3840bfeab5b3071ba33469f4379234f3a4f9c702c379343737c02bd7c4aa1aa6099e603709ed1d4939b8ae02938283821cb48dc1c2ca0cd467676527d9904ecc15641a5198f0237cfa108d6037d71e3b66764bfae557af25be965f911948754", 0x9a}, {&(0x7f00000007c0)="e5a7297e5ff96f4a4a2cea9bfe553f0b4fb68664d2a2969ffe3fa090254daf9ec158018c8a9b666c6869287481cfb401ac118667fdebbb7d7508b069176db6db3c8a804c7a7edb7967efcb9bbf1aa37e8d5409ee689384186dcad4e45b8013b4514d608f4fe662718da790f006f36e2a445b3411091d4387", 0x78}, {&(0x7f0000000840)="71d27559d9733b15193fee84eb92a0130414c9a74fbfdb21e875adb83a9952d87cbc3f090d764fef7a2e7817cb50b54cf32f410e30579091e901105fe95864c77aa3a3eb6f76dc2de5492ee97bc1e4878abbcc0be2f54fbf0fe6833c571eddbac9d87204f5982c441ca4eb7f9ef067be3ea7e65f8c8745602b645d6858e8ae4f49b62bcdf0e057f6bcd8bc9a9e691193705f6e9f3a4a13850f10c95cc34a22e60bc7", 0xa2}], 0x7, 0x0, 0x0, 0x2010801}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000280)}, {&(0x7f0000000380)="1d32fc21ddf3dea49af35643bf9b1fa598a386b28c62c5ef3547a3e8d88ee7f2a5832386010000800000000008246572cc1e036ef9", 0x35}, {&(0x7f0000000a00)="85bc6c15a10a0a0ee38eb82b3e25f69345c14309adadd2786edc677c0924cc654ea2bfb6bb3758fe80b8faa4ed4bcc1449097331674ee4cf4b3c9f7907c5e14b41e69423f4164f9bc4b7f3cfcd0ce8d2784fff1ce0301073848ca80ccafc3423fae7049e2568cbc1cd62cdde017e77a0cc4811d5c92cc7cffcce23a7d71133061bc312005acebcd67de1f66d45aa0490eed0bbcf28aff9fe93dc3a0c821f79f7300d", 0xa2}, {&(0x7f0000000ac0)="7265663f0ef1759e7159f8f7f550e0e65297df8cf451f019e0b5d315cba00f5a47", 0x21}, {&(0x7f0000000c00)="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", 0xff}, {&(0x7f0000000d00)="1d", 0x1}], 0x6, &(0x7f0000000f40)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r1, r2}}}], 0x40, 0x80}}], 0x2, 0x20000000) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f0000000180)={[], [{@fsmagic={'fsmagic', 0x3d, 0xadb9}}]}, 0x0, 0x243, &(0x7f0000000780)="$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") r3 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) recvfrom$unix(r3, &(0x7f0000000000)=""/167, 0xa7, 0x22, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r4, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r5, &(0x7f0000000740)='foo', 0x3) 12:48:52 executing program 3: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x14b042, 0x0) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x307e00}], 0x1, 0x1400, 0x0, 0x3) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lstat(0x0, 0x0) fallocate(r2, 0x0, 0x0, 0x4003fa) r3 = open(&(0x7f0000000180)='./bus\x00', 0x163042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000080)={0x6, r0}) 12:48:52 executing program 0: r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xac \xe8\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6)\x9f\x9cR\xae\x12G\xd8\xa4y\xef\x02?\xf2\xe7}\ra\x97F', 0x0) r1 = dup(r0) write$cgroup_pid(r1, &(0x7f0000000040)=0xffffffffffffffff, 0x12) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) sendfile(r0, r1, &(0x7f0000000100), 0x6c03) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x82, 0x0, &(0x7f0000000140)) 12:48:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000004c0)=@ipv4_newroute={0x38, 0x18, 0x35f32a6dfa748ddd, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x2}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @LWTUNNEL_IP_OPTS={0x4, 0x8, 0x0, 0x1, @LWTUNNEL_IP_OPTS_VXLAN={0xc, 0x2, 0x0, 0x1, @LWTUNNEL_IP_OPT_VXLAN_GBP={0x8}}}}]}, 0x38}}, 0x0) 12:48:52 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x63, 0x11, 0x23}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) 12:48:52 executing program 5: r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000002c0)='./file0\x00', 0x800, 0x400, &(0x7f0000001040)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r1) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000680)=[{{&(0x7f0000000300)=@file={0x0, './file0/file0/file0\x00'}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000400)="d5593aac8678973b44e52aefccf45aa952ca4e4d710950c2fbf3b9a6d94262ed51dddc11e9c9ebb03752593d9d451f41793cbbbe85a12c74d094c451f9ec248d4b4ac6ff99a9f369", 0x48}, {&(0x7f0000000dc0)="43ef61b0080002bfc60d643e361f192a3e9d5fc22a3ed7fa968f4af87c6dd9c4c5b662275dac011173f0a3dff6bd10800b8795cc87e07f8b38a0ef3b576b21341375a49f25cafadb31e66344a7f6be7d7c7d01f70f4e94663da98e3f07f75fe84e95b782bb2a462d4cba5dfb9487b3fd0b63e528470d3d0050b713dd1bd1f91a050e630a2ff989ee1576126fff40fd3d99ca0a4620e4d27d5b36ae10506bfc1af42e2b265f34cc58cc360de1ef37ad7a9ae3baf2827139c9cda05e5fff0b790a57d08fcc4001c18159fee0776de091", 0xcf}], 0x2, &(0x7f0000002c40)=ANY=[@ANYBLOB="200000004a0000000135203a2b000000cd8645b7f70e56bf7efe47038f1c8d52c5ea4864e49d6b53fdb407e31aee7600d9e530206d6de4f1537a00033b10fc659576f0d7de369bca323603606d23878695d7dc434a2a005869ff224d5e908a501b780791db488c09a646c22e39e742779f4e01010000393d6484a9a7e5c6fd35d8c2104bf68e6059efe1fdca9dc83a11d241db492b2dd10d205d572ef645ccf947be6f45654b69aafde3e1aa10fa2080baa793a8885a2d00000000000000d8d1699d55ac6e9ba0cafbf32b01574dc1326c46fc707d5dd44eca65c473ba595ed386d8f4b82b09dcda32b2e17ad4231b30458d4267f9c2e5107890dd219d4f2b7181c7f78ef1a87a0c6b0000000000000000000000000000003aa0621c285478e6a5f5e73d15b3b7f9beea2ef74984134875d69498fe5c594ab7d2830d7ef239b78d6f759d602b7650aa169612c204910e54232450bd0429ae280bc3ab293db76da9d33e93db095d0cc0ee1c86da597ccdc59b7e4bc81f70da92fe350548731b7bf2276d0738080758f0455fec9429f7b793023532420e9467dc5c189f3802373f9503dd5b2045d8383e928571e571bc6b624b1737b9710a160dd09e88abfa199a9a421b8a8648c0b09626b872fd09d537c7494322031efbdc", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="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", @ANYRES64=r2, @ANYRES8, @ANYRES16=0x0, @ANYRES64, @ANYBLOB="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"], 0x40, 0x800}}], 0x1, 0x20004805) (async) mount$9p_tcp(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0), 0x40, &(0x7f0000001240)=ANY=[@ANYBLOB='trans=tcp,port=0x0000000000004e21,debug=0x0000000000000098,mmap,dfltgid=', @ANYRESHEX=r2, @ANYBLOB="1405aee400000096641e20da8723eb7e720d0c8c643dc8e6c0faf748655ae3013688e5236a2c411bef20e98623bbf9bf7a60620e741cca51b62fc4c6", @ANYRESDEC, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB, @ANYRESDEC, @ANYBLOB="5ff9505fa227f81b3e68c4a294b6911bcf7c29677ddfaba1efd72892fa16b399afa5f364047c2bb8db582a8ad052535ce6"]) (async) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000fc0)=[{{&(0x7f0000000400)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000900)=[{&(0x7f0000000480)="70e2263e1e136eaa5f0e28ee10fc0d6afabb08cf2cc43dfc17906489ba88137f2a24008d260aa8a80ef900deb3821df04bb2099cefc167918b03de342b4cf041fc8eb09ea781", 0x46}, {&(0x7f0000000500)="7bfbf4d892350d4dc48d8e2f5bc27a9dfc1a451fcad422214254d79f2731a584c7712c6340b9de836e3ca74ea152919e1524adb97289299d4b5da076eba01f4a34690fa14f12e8f8da21f994c77ce2ed6edaac12e21a86dbedf7ac0993c859f198459c75ebb6ecd521de2132e14446671d2506b7ba0591636545547bdaf42072f1467151491468d06e36bebd4e6a5a2d180aa35f0ba7e5a8197cc4cac42d36238748de75f8abfabd4fb02d1c2259069cd77e1ae693ed36a1188d13d263f831132aefc4a38a9a0d6cbe60dab84d624655e6daf516a82612774373a3d453684b339fd5cdb3fd1d4346", 0xe8}, {&(0x7f0000000100)}, {&(0x7f0000000600)="392071c56edaa60e38ed257aaff50f536a52a23729d8362821c583382e366f2ff30ee1910cc99983b6dbe63b9f82b23de98dd12edde59169625400d8b9212c176dd6634a5929c07e3a06aca8d08ca8590a581e02e7565169e77075a07ae4fc164aeeff65a6aeb63511665f7dd5f331dbe88de35e94254c2908d713fbd62399878844590092e9b71b8f02f94184fb1effac3454d317113ccf1d0b87fd962e94b678a777c6aed9d2849be7b7d450f1", 0xae}, {&(0x7f00000006c0)="b0d3399763549d79f71e922b52498df50f6c787cdc97434cebb3b2793bcd4d34285ad895e0d10d27623c752bfe4db75314c3bfbf09dab6e270e4b3840bfeab5b3071ba33469f4379234f3a4f9c702c379343737c02bd7c4aa1aa6099e603709ed1d4939b8ae02938283821cb48dc1c2ca0cd467676527d9904ecc15641a5198f0237cfa108d6037d71e3b66764bfae557af25be965f911948754", 0x9a}, {&(0x7f00000007c0)="e5a7297e5ff96f4a4a2cea9bfe553f0b4fb68664d2a2969ffe3fa090254daf9ec158018c8a9b666c6869287481cfb401ac118667fdebbb7d7508b069176db6db3c8a804c7a7edb7967efcb9bbf1aa37e8d5409ee689384186dcad4e45b8013b4514d608f4fe662718da790f006f36e2a445b3411091d4387", 0x78}, {&(0x7f0000000840)="71d27559d9733b15193fee84eb92a0130414c9a74fbfdb21e875adb83a9952d87cbc3f090d764fef7a2e7817cb50b54cf32f410e30579091e901105fe95864c77aa3a3eb6f76dc2de5492ee97bc1e4878abbcc0be2f54fbf0fe6833c571eddbac9d87204f5982c441ca4eb7f9ef067be3ea7e65f8c8745602b645d6858e8ae4f49b62bcdf0e057f6bcd8bc9a9e691193705f6e9f3a4a13850f10c95cc34a22e60bc7", 0xa2}], 0x7, 0x0, 0x0, 0x2010801}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000280)}, {&(0x7f0000000380)="1d32fc21ddf3dea49af35643bf9b1fa598a386b28c62c5ef3547a3e8d88ee7f2a5832386010000800000000008246572cc1e036ef9", 0x35}, {&(0x7f0000000a00)="85bc6c15a10a0a0ee38eb82b3e25f69345c14309adadd2786edc677c0924cc654ea2bfb6bb3758fe80b8faa4ed4bcc1449097331674ee4cf4b3c9f7907c5e14b41e69423f4164f9bc4b7f3cfcd0ce8d2784fff1ce0301073848ca80ccafc3423fae7049e2568cbc1cd62cdde017e77a0cc4811d5c92cc7cffcce23a7d71133061bc312005acebcd67de1f66d45aa0490eed0bbcf28aff9fe93dc3a0c821f79f7300d", 0xa2}, {&(0x7f0000000ac0)="7265663f0ef1759e7159f8f7f550e0e65297df8cf451f019e0b5d315cba00f5a47", 0x21}, {&(0x7f0000000c00)="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", 0xff}, {&(0x7f0000000d00)="1d", 0x1}], 0x6, &(0x7f0000000f40)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r1, r2}}}], 0x40, 0x80}}], 0x2, 0x20000000) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f0000000180)={[], [{@fsmagic={'fsmagic', 0x3d, 0xadb9}}]}, 0x0, 0x243, &(0x7f0000000780)="$eJzs3TFoFXccB/Df3XuvaZJHSdulUGgLpZQ2ENKt0CVdWgiUEIoIKkREXBQjxAQ34+TioLNKJpcgbkZHyRJcFMEpaoa4CBocDA46PLn3XiSaJwYveSfc5wNH7sL/7vc/7r6/e8txAZTWQESMREQlIgYjohYRyeYBP7WWgfbmXO/SRESj8f/zpDmutd2ysV9/RMxGxJ8RsZgmcbQaMbOwf/Xl8r+/npuu/XJlYV9vV0+ybW115b/1y2Nnr4/+MXP3/tOxJEai/s557bykw/+qScQ3u1HsM5FUi54B2zF+6tqDLPffRsTPzfzXIo3WxTs/9cViLX6/9KF9Lzy793035wrsvEajlj0DZxtA6aQRUY8kHYqI1nqaDg21fsM/rPSlxyanTg4emZw+frhT96h0v2EBudUjVv652XOj/738P6k08/9l0fMDdk+W/z3j84+y9XWPcSiVLP+DB0//FvIPpSP/UF7yD+Ul/1Be8g/lJf9QXvIP5SX/UF7yD+Ul/1Bem/MPAJRLo6foN5CBohTdfwAAAAAAAAAAAAAAAAAAgK3mepcmNpZu1bx9MWLt74iodqpfaX6PONqfIu57kWTD3kpau+Vy4MecB8jpasFvX3/1uNj6d37Y2eMl2x+6srEyeyYihqvVrfdf0r7/Pt3XH5lm7VDOAjn9tbfY+q/ni60/uhxxK+s/w536TxrfNf927j/17PrlrH/iVc4DAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0DVvAgAA//9AFm0n") r3 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) recvfrom$unix(r3, &(0x7f0000000000)=""/167, 0xa7, 0x22, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r4, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) r5 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r5, &(0x7f0000000740)='foo', 0x3) 12:48:52 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), r0) sendmsg$IEEE802154_LLSEC_LIST_DEV(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r2, 0x1, 0x0, 0x0, {0x24}}, 0x14}}, 0x0) 12:48:52 executing program 5: r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000002c0)='./file0\x00', 0x800, 0x400, &(0x7f0000001040)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r1) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000680)=[{{&(0x7f0000000300)=@file={0x0, './file0/file0/file0\x00'}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000400)="d5593aac8678973b44e52aefccf45aa952ca4e4d710950c2fbf3b9a6d94262ed51dddc11e9c9ebb03752593d9d451f41793cbbbe85a12c74d094c451f9ec248d4b4ac6ff99a9f369", 0x48}, {&(0x7f0000000dc0)="43ef61b0080002bfc60d643e361f192a3e9d5fc22a3ed7fa968f4af87c6dd9c4c5b662275dac011173f0a3dff6bd10800b8795cc87e07f8b38a0ef3b576b21341375a49f25cafadb31e66344a7f6be7d7c7d01f70f4e94663da98e3f07f75fe84e95b782bb2a462d4cba5dfb9487b3fd0b63e528470d3d0050b713dd1bd1f91a050e630a2ff989ee1576126fff40fd3d99ca0a4620e4d27d5b36ae10506bfc1af42e2b265f34cc58cc360de1ef37ad7a9ae3baf2827139c9cda05e5fff0b790a57d08fcc4001c18159fee0776de091", 0xcf}], 0x2, &(0x7f0000002c40)=ANY=[@ANYBLOB="200000004a0000000135203a2b000000cd8645b7f70e56bf7efe47038f1c8d52c5ea4864e49d6b53fdb407e31aee7600d9e530206d6de4f1537a00033b10fc659576f0d7de369bca323603606d23878695d7dc434a2a005869ff224d5e908a501b780791db488c09a646c22e39e742779f4e01010000393d6484a9a7e5c6fd35d8c2104bf68e6059efe1fdca9dc83a11d241db492b2dd10d205d572ef645ccf947be6f45654b69aafde3e1aa10fa2080baa793a8885a2d00000000000000d8d1699d55ac6e9ba0cafbf32b01574dc1326c46fc707d5dd44eca65c473ba595ed386d8f4b82b09dcda32b2e17ad4231b30458d4267f9c2e5107890dd219d4f2b7181c7f78ef1a87a0c6b0000000000000000000000000000003aa0621c285478e6a5f5e73d15b3b7f9beea2ef74984134875d69498fe5c594ab7d2830d7ef239b78d6f759d602b7650aa169612c204910e54232450bd0429ae280bc3ab293db76da9d33e93db095d0cc0ee1c86da597ccdc59b7e4bc81f70da92fe350548731b7bf2276d0738080758f0455fec9429f7b793023532420e9467dc5c189f3802373f9503dd5b2045d8383e928571e571bc6b624b1737b9710a160dd09e88abfa199a9a421b8a8648c0b09626b872fd09d537c7494322031efbdc", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="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", @ANYRES64=r2, @ANYRES8, @ANYRES16=0x0, @ANYRES64, @ANYBLOB="4fab9553e5f100000021a400000000f9e3f41fb57ef8df6cab8016c9ce3ac08f2b0de792d7c706ed2f665ecc68b681fd7550710201d9751fa4e825662732f3a8c5bb3c2a7bedfc8388942a7f84f543f5aae98830850e4837677f000000000000009a04cf1eae879bfd790286c9fdc84bbb1445bb63447f73451530bcb43cde8f6c3c564ba1157d944311652a7a2a0f2845e931e945ad06149c51b866b68f257690ce1317526ed983323e256a5a8c4356ac469305f77243c338c60fd8bba96a1f6879bca4882eceb9f25ad58553284588166daa45a518c8b071335b5ff014842183b61e1b53c3dfa40a016d104490edff49534a1803a9a7d9c5d7d8de94d8e01525bc0e604a67f48474f6e2aae169f823a96622dc7dafbe14d70fbbd9ad701e9d1f63d8ed02af94e9805e33afb4c93e16574a4831dda9d091d9bdae0f3af6ae0040fd4abb72deca61ad382bdc32bd0af99e520def1dd52786cf68a2bdb235dbd6f8457839"], 0x40, 0x800}}], 0x1, 0x20004805) mount$9p_tcp(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0), 0x40, &(0x7f0000001240)=ANY=[@ANYBLOB='trans=tcp,port=0x0000000000004e21,debug=0x0000000000000098,mmap,dfltgid=', @ANYRESHEX=r2, @ANYBLOB="1405aee400000096641e20da8723eb7e720d0c8c643dc8e6c0faf748655ae3013688e5236a2c411bef20e98623bbf9bf7a60620e741cca51b62fc4c6", @ANYRESDEC, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB, @ANYRESDEC, @ANYBLOB="5ff9505fa227f81b3e68c4a294b6911bcf7c29677ddfaba1efd72892fa16b399afa5f364047c2bb8db582a8ad052535ce6"]) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000fc0)=[{{&(0x7f0000000400)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000900)=[{&(0x7f0000000480)="70e2263e1e136eaa5f0e28ee10fc0d6afabb08cf2cc43dfc17906489ba88137f2a24008d260aa8a80ef900deb3821df04bb2099cefc167918b03de342b4cf041fc8eb09ea781", 0x46}, {&(0x7f0000000500)="7bfbf4d892350d4dc48d8e2f5bc27a9dfc1a451fcad422214254d79f2731a584c7712c6340b9de836e3ca74ea152919e1524adb97289299d4b5da076eba01f4a34690fa14f12e8f8da21f994c77ce2ed6edaac12e21a86dbedf7ac0993c859f198459c75ebb6ecd521de2132e14446671d2506b7ba0591636545547bdaf42072f1467151491468d06e36bebd4e6a5a2d180aa35f0ba7e5a8197cc4cac42d36238748de75f8abfabd4fb02d1c2259069cd77e1ae693ed36a1188d13d263f831132aefc4a38a9a0d6cbe60dab84d624655e6daf516a82612774373a3d453684b339fd5cdb3fd1d4346", 0xe8}, {&(0x7f0000000100)}, {&(0x7f0000000600)="392071c56edaa60e38ed257aaff50f536a52a23729d8362821c583382e366f2ff30ee1910cc99983b6dbe63b9f82b23de98dd12edde59169625400d8b9212c176dd6634a5929c07e3a06aca8d08ca8590a581e02e7565169e77075a07ae4fc164aeeff65a6aeb63511665f7dd5f331dbe88de35e94254c2908d713fbd62399878844590092e9b71b8f02f94184fb1effac3454d317113ccf1d0b87fd962e94b678a777c6aed9d2849be7b7d450f1", 0xae}, {&(0x7f00000006c0)="b0d3399763549d79f71e922b52498df50f6c787cdc97434cebb3b2793bcd4d34285ad895e0d10d27623c752bfe4db75314c3bfbf09dab6e270e4b3840bfeab5b3071ba33469f4379234f3a4f9c702c379343737c02bd7c4aa1aa6099e603709ed1d4939b8ae02938283821cb48dc1c2ca0cd467676527d9904ecc15641a5198f0237cfa108d6037d71e3b66764bfae557af25be965f911948754", 0x9a}, {&(0x7f00000007c0)="e5a7297e5ff96f4a4a2cea9bfe553f0b4fb68664d2a2969ffe3fa090254daf9ec158018c8a9b666c6869287481cfb401ac118667fdebbb7d7508b069176db6db3c8a804c7a7edb7967efcb9bbf1aa37e8d5409ee689384186dcad4e45b8013b4514d608f4fe662718da790f006f36e2a445b3411091d4387", 0x78}, {&(0x7f0000000840)="71d27559d9733b15193fee84eb92a0130414c9a74fbfdb21e875adb83a9952d87cbc3f090d764fef7a2e7817cb50b54cf32f410e30579091e901105fe95864c77aa3a3eb6f76dc2de5492ee97bc1e4878abbcc0be2f54fbf0fe6833c571eddbac9d87204f5982c441ca4eb7f9ef067be3ea7e65f8c8745602b645d6858e8ae4f49b62bcdf0e057f6bcd8bc9a9e691193705f6e9f3a4a13850f10c95cc34a22e60bc7", 0xa2}], 0x7, 0x0, 0x0, 0x2010801}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000280)}, {&(0x7f0000000380)="1d32fc21ddf3dea49af35643bf9b1fa598a386b28c62c5ef3547a3e8d88ee7f2a5832386010000800000000008246572cc1e036ef9", 0x35}, {&(0x7f0000000a00)="85bc6c15a10a0a0ee38eb82b3e25f69345c14309adadd2786edc677c0924cc654ea2bfb6bb3758fe80b8faa4ed4bcc1449097331674ee4cf4b3c9f7907c5e14b41e69423f4164f9bc4b7f3cfcd0ce8d2784fff1ce0301073848ca80ccafc3423fae7049e2568cbc1cd62cdde017e77a0cc4811d5c92cc7cffcce23a7d71133061bc312005acebcd67de1f66d45aa0490eed0bbcf28aff9fe93dc3a0c821f79f7300d", 0xa2}, {&(0x7f0000000ac0)="7265663f0ef1759e7159f8f7f550e0e65297df8cf451f019e0b5d315cba00f5a47", 0x21}, {&(0x7f0000000c00)="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", 0xff}, {&(0x7f0000000d00)="1d", 0x1}], 0x6, &(0x7f0000000f40)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r1, r2}}}], 0x40, 0x80}}], 0x2, 0x20000000) (async) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f0000000180)={[], [{@fsmagic={'fsmagic', 0x3d, 0xadb9}}]}, 0x0, 0x243, &(0x7f0000000780)="$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") (async) r3 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) recvfrom$unix(r3, &(0x7f0000000000)=""/167, 0xa7, 0x22, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r4, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r5, &(0x7f0000000740)='foo', 0x3) 12:48:52 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001400)={0x2, 0x6, 0x0, 0x0, 0x2, 0x0, 0x800}, 0x10}}, 0x0) [ 3067.121654][ T4123] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 12:48:57 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) io_setup(0x1, &(0x7f0000001c80)) 12:48:57 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), r0) sendmsg$IEEE802154_LLSEC_LIST_DEV(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r2, 0x1, 0x0, 0x0, {0x24}}, 0x14}}, 0x0) 12:48:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004f40)={&(0x7f0000004d40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x4, [@const, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000004e80)=""/173, 0x64, 0xad, 0x1}, 0x20) 12:48:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) r3 = pidfd_getfd(r2, r1, 0x0) stat(&(0x7f0000000040)='mnt/encrypted_dir/file\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000100)='mnt\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r3, &(0x7f0000000000)='mnt/encrypted_dir/file\x00', r4, r5, 0x1000) write(r2, &(0x7f0000000740)='foo', 0x3) 12:48:57 executing program 3: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x14b042, 0x0) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x307e00}], 0x1, 0x1400, 0x0, 0x3) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lstat(0x0, 0x0) fallocate(r2, 0x0, 0x0, 0x4003fa) r3 = open(&(0x7f0000000180)='./bus\x00', 0x163042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000080)={0x6, r0}) 12:48:57 executing program 1: r0 = io_uring_setup(0x6ff1, &(0x7f0000000000)) r1 = socket$qrtr(0x2a, 0x2, 0x0) sendmmsg$sock(r1, &(0x7f0000007000)=[{{&(0x7f0000006b40)=@qipcrtr, 0x80, 0x0}}], 0x1, 0x0) read(r1, &(0x7f0000000080)=""/227, 0xe3) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x891a, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 12:48:57 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), r0) sendmsg$IEEE802154_LLSEC_LIST_DEV(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r2, 0x1, 0x0, 0x0, {0x24}}, 0x14}}, 0x0) 12:48:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, 0x0, 0x78) 12:48:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") (async) r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) r3 = pidfd_getfd(r2, r1, 0x0) stat(&(0x7f0000000040)='mnt/encrypted_dir/file\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000100)='mnt\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r3, &(0x7f0000000000)='mnt/encrypted_dir/file\x00', r4, r5, 0x1000) (async) write(r2, &(0x7f0000000740)='foo', 0x3) 12:48:57 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f0000004540)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x18, 0x0, 0x0, &(0x7f0000000200)=[@pktinfo={{0x24, 0x29, 0x32, {@loopback}}}], 0x28}}], 0x1, 0x0) 12:48:57 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), r0) sendmsg$IEEE802154_LLSEC_LIST_DEV(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r2, 0x1, 0x0, 0x0, {0x24}}, 0x14}}, 0x0) 12:48:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") (async, rerun: 32) r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) (rerun: 32) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) r3 = pidfd_getfd(r2, r1, 0x0) (async, rerun: 64) stat(&(0x7f0000000040)='mnt/encrypted_dir/file\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) (async, rerun: 64) stat(&(0x7f0000000100)='mnt\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r3, &(0x7f0000000000)='mnt/encrypted_dir/file\x00', r4, r5, 0x1000) write(r2, &(0x7f0000000740)='foo', 0x3) 12:48:58 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb904021d080006007c09e8fe55a10a0015400a00142603600e122f00160006005203a8000600200005400700027c035c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1, 0x0, 0x0, 0x4a0f0000}, 0x0) 12:48:58 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000003c0)='\x00') r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0xfffffffffffffe01, 0x6, 0x7, 0x0, 0x81, 0x0, 0xb5b, 0x10, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000200), 0xb}, 0x84001, 0x7, 0x7, 0x2, 0x3, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x7}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000600)={r2, r2, 0x1e}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x80, 0x20, 0x0, 0xc4, 0x20, 0x0, 0x20, 0x84, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x8001, 0x9}, 0x80200, 0x101, 0x7fffffff, 0x3, 0x5, 0x20, 0x0, 0x0, 0x0, 0x0, 0xa58}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0xf) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x9, 0x0, 0x0, 0x0, 0x61, 0x11, 0x3c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xe, 0x0}, 0x70) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x5, &(0x7f0000000880)=ANY=[@ANYBLOB="9800aaa10ab2d684240144acfffffffffb000001000000185400000a000000000000000000000000291e9718dc20f46fce514c20f1b74de7461fdc420a13d9381b4ad3db1629e02b5a9562dadc0cdeca8962e4eb3cbabbbb26474f728445c105985afa2f8f7e64c86141728addefd98666c2d8aa310000"], &(0x7f0000000840)='GPL\x00', 0x0, 0xde, &(0x7f0000000940)=""/222, 0x0, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1b, 0x1ff, 0x2, 0x4, 0x0, 0x1, 0x0, '\x00', 0x0, r5, 0x4, 0x5}, 0x48) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r6, &(0x7f00000005c0)='pids.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) write$cgroup_int(r3, &(0x7f0000000300), 0x12) 12:48:58 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c00000000000000120000f1850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x9, 0x5, 0x6, 0x403}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000001540)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', r1}, 0x10) 12:48:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='{'], 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0xc040, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f00000000c0)={@desc={0x1, 0x0, @auto="57673ca375f40b4a"}, 0x40, 0x0, '\x00', @b}) r1 = epoll_create1(0x0) epoll_pwait(r1, &(0x7f0000000080)=[{}], 0x1, 0xffffffff, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000000)={0xc0000004}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x4e20, @empty}, {0x306, @random="b8f5dc6787ff"}, 0x3a, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 'xfrm0\x00'}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r4, &(0x7f0000000740)='foo', 0x3) [ 3072.191100][ T4168] netlink: 'syz-executor.2': attribute type 21 has an invalid length. [ 3072.199413][ T4168] netlink: 128 bytes leftover after parsing attributes in process `syz-executor.2'. 12:48:58 executing program 3: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x14b042, 0x0) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x307e00}], 0x1, 0x1400, 0x0, 0x3) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lstat(0x0, 0x0) fallocate(r2, 0x0, 0x0, 0x4003fa) r3 = open(&(0x7f0000000180)='./bus\x00', 0x163042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000080)={0x6, r0}) 12:49:05 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000508000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x10000) 12:49:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETRULE(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000800)={0x20, 0x7, 0xa, 0x801, 0x0, 0x0, {}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x0) 12:49:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr={0x0, 0x2, 0x0, 0x13}]}}, 0x0, 0x26}, 0x20) 12:49:05 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000003c0)='\x00') r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0xfffffffffffffe01, 0x6, 0x7, 0x0, 0x81, 0x0, 0xb5b, 0x10, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000200), 0xb}, 0x84001, 0x7, 0x7, 0x2, 0x3, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x7}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000600)={r2, r2, 0x1e}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x80, 0x20, 0x0, 0xc4, 0x20, 0x0, 0x20, 0x84, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x8001, 0x9}, 0x80200, 0x101, 0x7fffffff, 0x3, 0x5, 0x20, 0x0, 0x0, 0x0, 0x0, 0xa58}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0xf) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x9, 0x0, 0x0, 0x0, 0x61, 0x11, 0x3c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xe, 0x0}, 0x70) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x5, &(0x7f0000000880)=ANY=[@ANYBLOB="9800aaa10ab2d684240144acfffffffffb000001000000185400000a000000000000000000000000291e9718dc20f46fce514c20f1b74de7461fdc420a13d9381b4ad3db1629e02b5a9562dadc0cdeca8962e4eb3cbabbbb26474f728445c105985afa2f8f7e64c86141728addefd98666c2d8aa310000"], &(0x7f0000000840)='GPL\x00', 0x0, 0xde, &(0x7f0000000940)=""/222, 0x0, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1b, 0x1ff, 0x2, 0x4, 0x0, 0x1, 0x0, '\x00', 0x0, r5, 0x4, 0x5}, 0x48) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r6, &(0x7f00000005c0)='pids.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) write$cgroup_int(r3, &(0x7f0000000300), 0x12) 12:49:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='{'], 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0xc040, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f00000000c0)={@desc={0x1, 0x0, @auto="57673ca375f40b4a"}, 0x40, 0x0, '\x00', @b}) (async) r1 = epoll_create1(0x0) epoll_pwait(r1, &(0x7f0000000080)=[{}], 0x1, 0xffffffff, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000000)={0xc0000004}) (async) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x4e20, @empty}, {0x306, @random="b8f5dc6787ff"}, 0x3a, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 'xfrm0\x00'}) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) r4 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r4, &(0x7f0000000740)='foo', 0x3) 12:49:05 executing program 3: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x14b042, 0x0) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x307e00}], 0x1, 0x1400, 0x0, 0x3) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lstat(0x0, 0x0) fallocate(r2, 0x0, 0x0, 0x4003fa) r3 = open(&(0x7f0000000180)='./bus\x00', 0x163042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000080)={0x6, r0}) 12:49:05 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f00000000c0)=0x10) shutdown(r0, 0x1) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000005600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f2d}, 0x14) 12:49:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[@sack_perm={0x4, 0x2}, @timestamp, @window, @mss, @timestamp, @timestamp, @mss, @window], 0x8) 12:49:05 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000003c0)='\x00') r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0xfffffffffffffe01, 0x6, 0x7, 0x0, 0x81, 0x0, 0xb5b, 0x10, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000200), 0xb}, 0x84001, 0x7, 0x7, 0x2, 0x3, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x7}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000600)={r2, r2, 0x1e}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x80, 0x20, 0x0, 0xc4, 0x20, 0x0, 0x20, 0x84, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x8001, 0x9}, 0x80200, 0x101, 0x7fffffff, 0x3, 0x5, 0x20, 0x0, 0x0, 0x0, 0x0, 0xa58}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0xf) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x9, 0x0, 0x0, 0x0, 0x61, 0x11, 0x3c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xe, 0x0}, 0x70) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x5, &(0x7f0000000880)=ANY=[@ANYBLOB="9800aaa10ab2d684240144acfffffffffb000001000000185400000a000000000000000000000000291e9718dc20f46fce514c20f1b74de7461fdc420a13d9381b4ad3db1629e02b5a9562dadc0cdeca8962e4eb3cbabbbb26474f728445c105985afa2f8f7e64c86141728addefd98666c2d8aa310000"], &(0x7f0000000840)='GPL\x00', 0x0, 0xde, &(0x7f0000000940)=""/222, 0x0, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1b, 0x1ff, 0x2, 0x4, 0x0, 0x1, 0x0, '\x00', 0x0, r5, 0x4, 0x5}, 0x48) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r6, &(0x7f00000005c0)='pids.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) write$cgroup_int(r3, &(0x7f0000000300), 0x12) 12:49:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) set_mempolicy(0x2, &(0x7f00000001c0)=0x3, 0x3) sendmsg$NFT_BATCH(r0, &(0x7f0000003200)={0x0, 0x0, &(0x7f00000031c0)={&(0x7f0000001d40)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x3, 0x0, 0x0, {0x2}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x68}}, 0x0) 12:49:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000001280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x9, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x7, 0x2}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, 0x0, 0x39, 0x0, 0x1}, 0x20) 12:49:05 executing program 2: r0 = epoll_create(0x8) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000240)='./file1\x00', 0x80c406, &(0x7f0000000700)=ANY=[@ANYBLOB='dots,dots,dmask=0000000\x00\x00200000,nodotss=nostale_ro,gid=\x00'/66, @ANYRESHEX=0xee00, @ANYBLOB="2c646f733178666cf60c06bd2c756d61736b3d303030303030304a3030303011373737373737373737372c00"], 0x1, 0x291, &(0x7f0000000280)="$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") epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000540)) 12:49:09 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000100)={[{0x2d, 'pids'}]}, 0x6) 12:49:09 executing program 1: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mmap(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x1000000, 0x100010, 0xffffffffffffffff, 0xe5691000) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r5 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) socketpair$unix(0x1, 0x0, 0x0, 0x0) statx(r0, &(0x7f00000002c0)='./file0\x00', 0x800, 0x400, &(0x7f0000001040)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r6) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_GETFSMAP(r7, 0xc0c0583b, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, '\x00', [{}, {0xffffffff}]}) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000680)=[{{&(0x7f0000000300)=@file={0x0, './file0/file0/file0\x00'}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000400)="d5593aac8678973b44e52aefccf45aa952ca4e4d710950c2fbf3b9a6d94262ed51dddc11e9c9ebb03752593d9d451f41793cbbbe85a12c74d094c451f9ec248d4b4ac6ff99a9f369", 0x48}, {&(0x7f0000000dc0)="43ef61b0080002bfc60d643e361f192a3e9d5fc22a3ed7fa968f4af87c6dd9c4c5b662275dac011173f0a3dff6bd10800b8795cc87e07f8b38a0ef3b576b21341375a49f25cafadb31e66344a7f6be7d7c7d01f70f4e94663da98e3f07f75fe84e95b782bb2a462d4cba5dfb9487b3fd0b63e528470d3d0050b713dd1bd1f91a050e630a2ff989ee1576126fff40fd3d99ca0a4620e4d27d5b36ae10506bfc1af42e2b265f34cc58cc360de1ef37ad7a9ae3baf28271", 0xb6}], 0x2, &(0x7f0000002c40)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="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", @ANYRES64=r8, @ANYRES8, @ANYRES16=0x0, @ANYRES64, @ANYBLOB="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"], 0x40, 0x800}}], 0x1, 0x20004805) getuid() sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) 12:49:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='{'], 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0xc040, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f00000000c0)={@desc={0x1, 0x0, @auto="57673ca375f40b4a"}, 0x40, 0x0, '\x00', @b}) r1 = epoll_create1(0x0) epoll_pwait(r1, &(0x7f0000000080)=[{}], 0x1, 0xffffffff, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000000)={0xc0000004}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x4e20, @empty}, {0x306, @random="b8f5dc6787ff"}, 0x3a, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 'xfrm0\x00'}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r4, &(0x7f0000000740)='foo', 0x3) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='{'], 0x0, 0x236, &(0x7f0000000300)="$eJzs3TFoM2UcBvDnLomf/b4gVRdBUEFEtFDqJrjURaEgpYgIKlREXJRWqC1urZOLg84qnVyKuFkdpUtxUQSnqh3qImhxsDjoELlcK9VGFFNz8t3vB5fcJe97//e4e95kOS5Aa00nmU/SSTKTpJekON/grnqZPt3cntpfTgaDx38shu3q7dpZv2tJtpI8mGSvLPJiN9nYffro54NH731jvXfPe7tPTU30IE8dHx0+dvLu4usfLjyw8fmX3y8WmU//D8d1+YoRn3WL5Jb/otj/RNFtegT8E0uvfvBVlftbk9w9zH8vZeqT9+baDXu93P/OX/V964cvbp/kWIHLNxj0qt/ArQHQOmWSfopyNkm9Xpazs/V/+K87V8uXVtdemXlhdX3l+aZnKuCy9JPDRz6+8tG1P+X/u06df+D6VeX/iaWdb6r1k07TowEmqcr/zLOb90X+oXXkH9pL/qG95B/aS/6hveQf2kv+ob3kH9pL/qG95B/a63z+AYB2GVxp+g5koClNzz8AAAAAAAAAAAAAAAAAAMBF21P7y2fLpGp++nZy/HCS7qj6neHziJMbh69XfyqqZr8r6m5jeebOMXcwpvcbvvv6pm+brf/ZHc3W31xJtl5LMtftXrz+itPr79+7+W++7z03ZoExPfRks/V/3Wm2/sJB8kk1/8yNmn/K3DZ8Hz3/9KvzN2b9l38ZcwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABMzG8BAAD//8n0bSk=") (async) openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0xc040, 0x0) (async) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f00000000c0)={@desc={0x1, 0x0, @auto="57673ca375f40b4a"}, 0x40, 0x0, '\x00', @b}) (async) epoll_create1(0x0) (async) epoll_pwait(r1, &(0x7f0000000080)=[{}], 0x1, 0xffffffff, 0x0, 0x0) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000000)={0xc0000004}) (async) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x4e20, @empty}, {0x306, @random="b8f5dc6787ff"}, 0x3a, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 'xfrm0\x00'}) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) (async) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) (async) write(r4, &(0x7f0000000740)='foo', 0x3) (async) 12:49:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_GET_FEATURE(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x10}, 0x10}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000100005070400"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="5000000024000b1d000800800000000000000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000003000d00010066715f636f64656c"], 0x50}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=@newtfilter={0x34, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {0x0, 0xffff}, {}, {0xc}}, [@filter_kind_options=@f_flow={{0x9}, {0x4}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r3, &(0x7f00000002c0), 0x40000000000009f, 0x0) 12:49:09 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000003c0)='\x00') r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0xfffffffffffffe01, 0x6, 0x7, 0x0, 0x81, 0x0, 0xb5b, 0x10, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000200), 0xb}, 0x84001, 0x7, 0x7, 0x2, 0x3, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x7}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000600)={r2, r2, 0x1e}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x80, 0x20, 0x0, 0xc4, 0x20, 0x0, 0x20, 0x84, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x8001, 0x9}, 0x80200, 0x101, 0x7fffffff, 0x3, 0x5, 0x20, 0x0, 0x0, 0x0, 0x0, 0xa58}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0xf) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x9, 0x0, 0x0, 0x0, 0x61, 0x11, 0x3c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xe, 0x0}, 0x70) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x5, &(0x7f0000000880)=ANY=[@ANYBLOB="9800aaa10ab2d684240144acfffffffffb000001000000185400000a000000000000000000000000291e9718dc20f46fce514c20f1b74de7461fdc420a13d9381b4ad3db1629e02b5a9562dadc0cdeca8962e4eb3cbabbbb26474f728445c105985afa2f8f7e64c86141728addefd98666c2d8aa310000"], &(0x7f0000000840)='GPL\x00', 0x0, 0xde, &(0x7f0000000940)=""/222, 0x0, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1b, 0x1ff, 0x2, 0x4, 0x0, 0x1, 0x0, '\x00', 0x0, r5, 0x4, 0x5}, 0x48) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r6, &(0x7f00000005c0)='pids.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) write$cgroup_int(r3, &(0x7f0000000300), 0x12) 12:49:09 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20c}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}, 0x1, 0xba01}, 0x0) 12:49:09 executing program 4: r0 = open(&(0x7f0000000300)='./file0\x00', 0x64842, 0x0) pwritev2(r0, 0x0, 0x0, 0x0, 0x0, 0x3) [ 3083.423864][ T4222] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1019 sclass=netlink_route_socket pid=4222 comm=syz-executor.0 [ 3083.435953][ T4219] ipvlan2: entered allmulticast mode [ 3083.442193][ T4219] bridge0: entered allmulticast mode [ 3083.450646][ T4219] bridge0: port 4(ipvlan2) entered blocking state [ 3083.457192][ T4219] bridge0: port 4(ipvlan2) entered disabled state 12:49:09 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$packet(0x11, 0x0, 0x300) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SNAPSHOT_FREE(0xffffffffffffffff, 0x3305) syz_genetlink_get_family_id$smc(0x0, 0xffffffffffffffff) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) ioctl$SNAPSHOT_PREF_IMAGE_SIZE(r0, 0x3312, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) clock_gettime(0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) [ 3083.472405][ T4222] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3083.495255][ T4222] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3083.553421][ T4238] ipvlan2: entered allmulticast mode [ 3083.561485][ T4238] bridge0: port 4(ipvlan2) entered blocking state [ 3083.568035][ T4238] bridge0: port 4(ipvlan2) entered disabled state 12:49:09 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x2, 0x13, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x12, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private0}}, @sadb_lifetime={0x4, 0x3b2ad8a3d868eb7e}, @sadb_address={0x5, 0x17, 0x0, 0xa0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0x80}}, 0x0) 12:49:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001e80)={0x20, r1, 0x39, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0xc, 0x11d, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x4, 0x4}]}]}]}, 0x20}}, 0x0) 12:49:09 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20c}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}, 0x1, 0xba01}, 0x0) 12:49:09 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r2 = openat(r0, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x1c2) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r3, &(0x7f0000000740)='foo', 0x3) [ 3083.584615][ T25] audit: type=1400 audit(1682858949.398:1167): avc: denied { read } for pid=4231 comm="syz-executor.4" name="snapshot" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 12:49:10 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs={0x0, 0x0, 0x4e23}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket(0x0, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000007c0), 0xffffffffffffffff) getpgrp(0x0) sched_setaffinity(r0, 0x0, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000800)={0x6, 0xffffffffffffffff}, &(0x7f0000000840)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) syz_read_part_table(0x595, &(0x7f00000001c0)="$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") [ 3091.808306][ T4265] hub 5-0:1.0: USB hub found [ 3091.813141][ T4265] hub 5-0:1.0: 8 ports detected 12:49:17 executing program 2: r0 = socket$igmp6(0xa, 0x3, 0x3a) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xca, &(0x7f0000000080)={0x1, 0x1}, 0xc) setsockopt$MRT6_FLUSH(r0, 0x29, 0xd4, &(0x7f0000000180)=0xc, 0x4) 12:49:17 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) r2 = openat(r0, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x1c2) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r3, &(0x7f0000000740)='foo', 0x3) 12:49:17 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20c}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}, 0x1, 0xba01}, 0x0) 12:49:17 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$packet(0x11, 0x0, 0x300) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SNAPSHOT_FREE(0xffffffffffffffff, 0x3305) syz_genetlink_get_family_id$smc(0x0, 0xffffffffffffffff) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) ioctl$SNAPSHOT_PREF_IMAGE_SIZE(r0, 0x3312, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) clock_gettime(0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 12:49:17 executing program 1: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mmap(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x1000000, 0x100010, 0xffffffffffffffff, 0xe5691000) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r5 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) socketpair$unix(0x1, 0x0, 0x0, 0x0) statx(r0, &(0x7f00000002c0)='./file0\x00', 0x800, 0x400, &(0x7f0000001040)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r6) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_GETFSMAP(r7, 0xc0c0583b, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, '\x00', [{}, {0xffffffff}]}) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000680)=[{{&(0x7f0000000300)=@file={0x0, './file0/file0/file0\x00'}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000400)="d5593aac8678973b44e52aefccf45aa952ca4e4d710950c2fbf3b9a6d94262ed51dddc11e9c9ebb03752593d9d451f41793cbbbe85a12c74d094c451f9ec248d4b4ac6ff99a9f369", 0x48}, {&(0x7f0000000dc0)="43ef61b0080002bfc60d643e361f192a3e9d5fc22a3ed7fa968f4af87c6dd9c4c5b662275dac011173f0a3dff6bd10800b8795cc87e07f8b38a0ef3b576b21341375a49f25cafadb31e66344a7f6be7d7c7d01f70f4e94663da98e3f07f75fe84e95b782bb2a462d4cba5dfb9487b3fd0b63e528470d3d0050b713dd1bd1f91a050e630a2ff989ee1576126fff40fd3d99ca0a4620e4d27d5b36ae10506bfc1af42e2b265f34cc58cc360de1ef37ad7a9ae3baf28271", 0xb6}], 0x2, &(0x7f0000002c40)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="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", @ANYRES64=r8, @ANYRES8, @ANYRES16=0x0, @ANYRES64, @ANYBLOB="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"], 0x40, 0x800}}], 0x1, 0x20004805) getuid() sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) 12:49:17 executing program 0: unshare(0x400) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, 0x0, 0x0) 12:49:17 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mmap(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x1000000, 0x100010, 0xffffffffffffffff, 0xe5691000) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r5 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) socketpair$unix(0x1, 0x0, 0x0, 0x0) statx(r0, &(0x7f00000002c0)='./file0\x00', 0x800, 0x400, &(0x7f0000001040)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r6) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_GETFSMAP(r7, 0xc0c0583b, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, '\x00', [{}, {0xffffffff}]}) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000680)=[{{&(0x7f0000000300)=@file={0x0, './file0/file0/file0\x00'}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000400)="d5593aac8678973b44e52aefccf45aa952ca4e4d710950c2fbf3b9a6d94262ed51dddc11e9c9ebb03752593d9d451f41793cbbbe85a12c74d094c451f9ec248d4b4ac6ff99a9f369", 0x48}, {&(0x7f0000000dc0)="43ef61b0080002bfc60d643e361f192a3e9d5fc22a3ed7fa968f4af87c6dd9c4c5b662275dac011173f0a3dff6bd10800b8795cc87e07f8b38a0ef3b576b21341375a49f25cafadb31e66344a7f6be7d7c7d01f70f4e94663da98e3f07f75fe84e95b782bb2a462d4cba5dfb9487b3fd0b63e528470d3d0050b713dd1bd1f91a050e630a2ff989ee1576126fff40fd3d99ca0a4620e4d27d5b36ae10506bfc1af42e2b265f34cc58cc360de1ef37ad7a9ae3baf28271", 0xb6}], 0x2, &(0x7f0000002c40)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="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", @ANYRES64=r8, @ANYRES8, @ANYRES16=0x0, @ANYRES64, @ANYBLOB="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"], 0x40, 0x800}}], 0x1, 0x20004805) getuid() sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) 12:49:17 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$eJzs3TFoM2UcBvDnLomf/b4gVRdBUEFEtFDqJrjURaEgpYgIKlREXJRWqC1urZOLg84qnVyKuFkdpUtxUQSnqh3qImhxsDjoELlcK9VGFFNz8t3vB5fcJe97//e4e95kOS5Aa00nmU/SSTKTpJekON/grnqZPt3cntpfTgaDx38shu3q7dpZv2tJtpI8mGSvLPJiN9nYffro54NH731jvXfPe7tPTU30IE8dHx0+dvLu4usfLjyw8fmX3y8WmU//D8d1+YoRn3WL5Jb/otj/RNFtegT8E0uvfvBVlftbk9w9zH8vZeqT9+baDXu93P/OX/V964cvbp/kWIHLNxj0qt/ArQHQOmWSfopyNkm9Xpazs/V/+K87V8uXVtdemXlhdX3l+aZnKuCy9JPDRz6+8tG1P+X/u06df+D6VeX/iaWdb6r1k07TowEmqcr/zLOb90X+oXXkH9pL/qG95B/aS/6hveQf2kv+ob3kH9pL/qG95B/a63z+AYB2GVxp+g5koClNzz8AAAAAAAAAAAAAAAAAAMBF21P7y2fLpGp++nZy/HCS7qj6neHziJMbh69XfyqqZr8r6m5jeebOMXcwpvcbvvv6pm+brf/ZHc3W31xJtl5LMtftXrz+itPr79+7+W++7z03ZoExPfRks/V/3Wm2/sJB8kk1/8yNmn/K3DZ8Hz3/9KvzN2b9l38ZcwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABMzG8BAAD//8n0bSk=") r1 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async, rerun: 64) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async, rerun: 64) r2 = openat(r0, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x1c2) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r3, &(0x7f0000000740)='foo', 0x3) 12:49:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) r3 = accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f0000000040)=0x10, 0x80000) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000080)={0x6, 0x5, 0x5, 0xffffffffffffffff, 0x4, 0x6}) write(r2, &(0x7f0000000740)='foo', 0x3) 12:49:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$eJzs3TFoM2UcBvDnLomf/b4gVRdBUEFEtFDqJrjURaEgpYgIKlREXJRWqC1urZOLg84qnVyKuFkdpUtxUQSnqh3qImhxsDjoELlcK9VGFFNz8t3vB5fcJe97//e4e95kOS5Aa00nmU/SSTKTpJekON/grnqZPt3cntpfTgaDx38shu3q7dpZv2tJtpI8mGSvLPJiN9nYffro54NH731jvXfPe7tPTU30IE8dHx0+dvLu4usfLjyw8fmX3y8WmU//D8d1+YoRn3WL5Jb/otj/RNFtegT8E0uvfvBVlftbk9w9zH8vZeqT9+baDXu93P/OX/V964cvbp/kWIHLNxj0qt/ArQHQOmWSfopyNkm9Xpazs/V/+K87V8uXVtdemXlhdX3l+aZnKuCy9JPDRz6+8tG1P+X/u06df+D6VeX/iaWdb6r1k07TowEmqcr/zLOb90X+oXXkH9pL/qG95B/aS/6hveQf2kv+ob3kH9pL/qG95B/a63z+AYB2GVxp+g5koClNzz8AAAAAAAAAAAAAAAAAAMBF21P7y2fLpGp++nZy/HCS7qj6neHziJMbh69XfyqqZr8r6m5jeebOMXcwpvcbvvv6pm+brf/ZHc3W31xJtl5LMtftXrz+itPr79+7+W++7z03ZoExPfRks/V/3Wm2/sJB8kk1/8yNmn/K3DZ8Hz3/9KvzN2b9l38ZcwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABMzG8BAAD//8n0bSk=") (async) r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async, rerun: 32) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (rerun: 32) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) r3 = accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f0000000040)=0x10, 0x80000) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000080)={0x6, 0x5, 0x5, 0xffffffffffffffff, 0x4, 0x6}) (async) write(r2, &(0x7f0000000740)='foo', 0x3) 12:49:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") (async) r0 = openat(0xffffffffffffff9c, &(0x7f0000000540)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x180) r3 = accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f0000000040)=0x10, 0x80000) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000080)={0x6, 0x5, 0x5, 0xffffffffffffffff, 0x4, 0x6}) (async) write(r2, &(0x7f0000000740)='foo', 0x3) [ 3092.133814][ T4272] pim6reg: entered allmulticast mode [ 3092.139677][ T4272] pim6reg: left allmulticast mode [ 3092.159284][ T4273] ipvlan2: entered allmulticast mode [ 3092.165463][ T4273] bridge0: port 4(ipvlan2) entered blocking state [ 3092.171969][ T4273] bridge0: port 4(ipvlan2) entered disabled state [ 3092.200743][ T4292] ================================================================== [ 3092.208841][ T4292] BUG: KCSAN: data-race in mas_state_walk / mast_fill_bnode [ 3092.216118][ T4292] [ 3092.218425][ T4292] write to 0xffff888130af0a00 of 8 bytes by task 4291 on cpu 1: [ 3092.226034][ T4292] mast_fill_bnode+0x126/0xeb0 [ 3092.230785][ T4292] mas_wr_modify+0x1819/0x39e0 [ 3092.235537][ T4292] mas_wr_store_entry+0x701/0x840 [ 3092.240569][ T4292] mas_store_prealloc+0xe9/0x250 [ 3092.245496][ T4292] vma_iter_store+0xcb/0xe0 [ 3092.249988][ T4292] mmap_region+0xcd2/0x1490 [ 3092.254487][ T4292] do_mmap+0x67c/0xaa0 [ 3092.258561][ T4292] vm_mmap_pgoff+0x12f/0x240 [ 3092.263139][ T4292] ksys_mmap_pgoff+0xc5/0x320 [ 3092.267806][ T4292] do_syscall_64+0x41/0xc0 [ 3092.272211][ T4292] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 3092.278094][ T4292] [ 3092.280403][ T4292] read to 0xffff888130af0a00 of 8 bytes by task 4292 on cpu 0: [ 3092.287926][ T4292] mas_state_walk+0x267/0x5d0 [ 3092.292590][ T4292] mas_walk+0x1f/0xd0 [ 3092.296567][ T4292] lock_vma_under_rcu+0x89/0x2b0 [ 3092.301504][ T4292] exc_page_fault+0x16e/0x790 [ 3092.306173][ T4292] asm_exc_page_fault+0x26/0x30 [ 3092.311013][ T4292] [ 3092.313319][ T4292] value changed: 0xffff888104ab6b06 -> 0xffff888130af0a00 [ 3092.320410][ T4292] [ 3092.322757][ T4292] Reported by Kernel Concurrency Sanitizer on: [ 3092.328888][ T4292] CPU: 0 PID: 4292 Comm: syz-executor.5 Not tainted 6.3.0-syzkaller-11733-g825a0714d2b3 #0 [ 3092.338849][ T4292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 3092.348899][ T4292] ================================================================== 12:49:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$eJzs3TFoM2UcBvDnLomf/b4gVRdBUEFEtFDqJrjURaEgpYgIKlREXJRWqC1urZOLg84qnVyKuFkdpUtxUQSnqh3qImhxsDjoELlcK9VGFFNz8t3vB5fcJe97//e4e95kOS5Aa00nmU/SSTKTpJekON/grnqZPt3cntpfTgaDx38shu3q7dpZv2tJtpI8mGSvLPJiN9nYffro54NH731jvXfPe7tPTU30IE8dHx0+dvLu4usfLjyw8fmX3y8WmU//D8d1+YoRn3WL5Jb/otj/RNFtegT8E0uvfvBVlftbk9w9zH8vZeqT9+baDXu93P/OX/V964cvbp/kWIHLNxj0qt/ArQHQOmWSfopyNkm9Xpazs/V/+K87V8uXVtdemXlhdX3l+aZnKuCy9JPDRz6+8tG1P+X/u06df+D6VeX/iaWdb6r1k07TowEmqcr/zLOb90X+oXXkH9pL/qG95B/aS/6hveQf2kv+ob3kH9pL/qG95B/a63z+AYB2GVxp+g5koClNzz8AAAAAAAAAAAAAAAAAAMBF21P7y2fLpGp++nZy/HCS7qj6neHziJMbh69XfyqqZr8r6m5jeebOMXcwpvcbvvv6pm+brf/ZHc3W31xJtl5LMtftXrz+itPr79+7+W++7z03ZoExPfRks/V/3Wm2/sJB8kk1/8yNmn/K3DZ8Hz3/9KvzN2b9l38ZcwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABMzG8BAAD//8n0bSk=") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./mnt\x00', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = signalfd4(r1, &(0x7f0000000000)={[0x80000001]}, 0x8, 0x80000) r3 = openat(r2, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x0) write(r3, &(0x7f0000000740)='foo', 0x3) 12:49:18 executing program 2: r0 = socket$igmp6(0xa, 0x3, 0x3a) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xca, &(0x7f0000000080)={0x1, 0x1}, 0xc) setsockopt$MRT6_FLUSH(r0, 0x29, 0xd4, &(0x7f0000000180)=0xc, 0x4) 12:49:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./mnt\x00', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) r2 = signalfd4(r1, &(0x7f0000000000)={[0x80000001]}, 0x8, 0x80000) r3 = openat(r2, &(0x7f0000000700)='mnt/encrypted_dir/file\x00', 0x42, 0x0) write(r3, &(0x7f0000000740)='foo', 0x3) [ 3092.465491][ T4302] pim6reg: entered allmulticast mode [ 3092.479517][ T4302] pim6reg: left allmulticast mode 12:49:18 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20c}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}, 0x1, 0xba01}, 0x0) [ 3092.710338][ T4307] ipvlan2: entered allmulticast mode [ 3092.716053][ T4307] bridge0: port 4(ipvlan2) entered blocking state [ 3092.722487][ T4307] bridge0: port 4(ipvlan2) entered disabled state 12:49:18 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$packet(0x11, 0x0, 0x300) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SNAPSHOT_FREE(0xffffffffffffffff, 0x3305) syz_genetlink_get_family_id$smc(0x0, 0xffffffffffffffff) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) ioctl$SNAPSHOT_PREF_IMAGE_SIZE(r0, 0x3312, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) clock_gettime(0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) [ 3093.015140][ T25] audit: type=1400 audit(1682858958.838:1168): avc: denied { ioctl } for pid=4308 comm="syz-executor.4" path="/dev/snapshot" dev="devtmpfs" ino=90 ioctlcmd=0x3312 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1