0000000000000000002004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000001000000010c0400000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:32 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x14}}, 0x0) [ 675.777215] attempt to access beyond end of device [ 675.782190] loop4: rw=12288, want=4104, limit=12 [ 675.816167] attempt to access beyond end of device [ 675.833400] loop4: rw=12288, want=8200, limit=12 [ 675.854504] attempt to access beyond end of device 10:54:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000c00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000003f04000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 675.881532] loop4: rw=12288, want=4104, limit=12 10:54:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000001000000010d0400000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 675.920692] attempt to access beyond end of device [ 675.940785] loop4: rw=12288, want=8200, limit=12 [ 676.017565] attempt to access beyond end of device [ 676.027311] loop4: rw=12288, want=4104, limit=12 [ 676.052799] attempt to access beyond end of device [ 676.076033] loop4: rw=12288, want=8200, limit=12 [ 676.087112] attempt to access beyond end of device [ 676.094700] loop4: rw=12288, want=4104, limit=12 [ 676.119814] attempt to access beyond end of device [ 676.131138] loop4: rw=12288, want=8200, limit=12 10:54:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x6700, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:33 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x60}}, 0x0) 10:54:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000001000000010e0400000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000004004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009fc0f00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:33 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f2012c0b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:54:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f00000000000000006b6b6b04000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 676.404787] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 676.435430] attempt to access beyond end of device 10:54:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000500000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 676.465761] loop4: rw=12288, want=4104, limit=12 [ 676.500173] attempt to access beyond end of device 10:54:33 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0xc0}}, 0x0) 10:54:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009001f00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 676.523618] loop4: rw=12288, want=8200, limit=12 [ 676.563011] attempt to access beyond end of device 10:54:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000048004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001040500000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 676.590638] loop4: rw=12288, want=4104, limit=12 [ 676.608771] attempt to access beyond end of device [ 676.643958] loop4: rw=12288, want=8200, limit=12 [ 676.761201] attempt to access beyond end of device [ 676.770532] loop4: rw=12288, want=4104, limit=12 [ 676.790835] attempt to access beyond end of device [ 676.796318] loop4: rw=12288, want=8200, limit=12 [ 676.809401] attempt to access beyond end of device [ 676.814536] loop4: rw=12288, want=4104, limit=12 [ 676.820077] attempt to access beyond end of device [ 676.825256] loop4: rw=12288, want=8200, limit=12 10:54:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x6800, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009002000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:34 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0xec0}}, 0x0) 10:54:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f00000000000000ffffffeb04000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000600000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:34 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201480b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:54:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f00000000000000fffffff604000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001040600000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:34 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x33fe0}}, 0x0) [ 677.041964] attempt to access beyond end of device [ 677.049582] loop4: rw=12288, want=4104, limit=12 [ 677.076515] attempt to access beyond end of device [ 677.114027] loop4: rw=12288, want=8200, limit=12 [ 677.144046] attempt to access beyond end of device 10:54:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009002200030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 677.169018] loop4: rw=12288, want=4104, limit=12 [ 677.194586] attempt to access beyond end of device 10:54:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f00000000000000fffffdfc04000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000700000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 677.217165] loop4: rw=12288, want=8200, limit=12 [ 677.293065] attempt to access beyond end of device [ 677.309504] loop4: rw=12288, want=4104, limit=12 [ 677.334316] attempt to access beyond end of device [ 677.360618] loop4: rw=12288, want=8200, limit=12 [ 677.381926] f2fs_msg: 234 callbacks suppressed [ 677.381938] F2FS-fs (loop4): Failed to get valid F2FS checkpoint [ 677.406597] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 677.413999] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock [ 677.426499] attempt to access beyond end of device [ 677.438502] loop4: rw=12288, want=4104, limit=12 [ 677.463200] attempt to access beyond end of device [ 677.475162] loop4: rw=12288, want=8200, limit=12 [ 677.498110] F2FS-fs (loop4): Failed to get valid F2FS checkpoint [ 677.582939] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x8100000) [ 677.593859] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 677.611266] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 677.625442] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock 10:54:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x6900, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:34 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x200001a8}}, 0x0) 10:54:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009002300030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f00000000000000fffffffe04000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001040700000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:34 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f2014c0b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) [ 677.636685] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x8100000) [ 677.644331] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock 10:54:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f00000000000000fcfdffff04000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001040800000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 677.776858] attempt to access beyond end of device [ 677.782099] loop4: rw=12288, want=4104, limit=12 10:54:34 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x7ffff000}}, 0x0) [ 677.828358] attempt to access beyond end of device 10:54:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009eb2600030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 677.854045] loop4: rw=12288, want=8200, limit=12 [ 677.899055] attempt to access beyond end of device 10:54:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f00000000000000ebffffff04000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 677.921351] loop4: rw=12288, want=4104, limit=12 [ 677.953689] attempt to access beyond end of device 10:54:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000900000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 677.981029] loop4: rw=12288, want=8200, limit=12 [ 678.057166] attempt to access beyond end of device [ 678.062290] loop4: rw=12288, want=4104, limit=12 [ 678.088549] attempt to access beyond end of device [ 678.123785] loop4: rw=12288, want=8200, limit=12 [ 678.142470] attempt to access beyond end of device [ 678.160301] loop4: rw=12288, want=4104, limit=12 [ 678.175111] attempt to access beyond end of device [ 678.191433] loop4: rw=12288, want=8200, limit=12 10:54:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x6a00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:35 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0xfffffdef}}, 0x0) 10:54:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f00000000000000f6ffffff04000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009ed2600030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001040900000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:35 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201680b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) [ 678.430278] attempt to access beyond end of device [ 678.449542] loop4: rw=12288, want=4104, limit=12 [ 678.466521] attempt to access beyond end of device 10:54:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f00000000000000feffffff04000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 678.482557] loop4: rw=12288, want=8200, limit=12 10:54:35 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x2}, 0x0) [ 678.520620] attempt to access beyond end of device 10:54:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001040a00000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009002c00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 678.549649] loop4: rw=12288, want=4104, limit=12 [ 678.564654] attempt to access beyond end of device [ 678.611118] loop4: rw=12288, want=8200, limit=12 10:54:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000001000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 678.646497] nla_parse: 3 callbacks suppressed [ 678.646507] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:54:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001040b00000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 678.693611] attempt to access beyond end of device [ 678.702920] loop4: rw=12288, want=4104, limit=12 [ 678.735709] attempt to access beyond end of device [ 678.765699] loop4: rw=12288, want=8200, limit=12 [ 678.801215] attempt to access beyond end of device [ 678.836767] loop4: rw=12288, want=4104, limit=12 [ 678.852819] attempt to access beyond end of device [ 678.865702] loop4: rw=12288, want=8200, limit=12 10:54:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x6b00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009003f00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000002000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:36 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x4}, 0x0) 10:54:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000c00000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:36 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f2016c0b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) [ 679.103778] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 679.136516] attempt to access beyond end of device [ 679.154370] loop4: rw=12288, want=4104, limit=12 10:54:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000003000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 679.202978] attempt to access beyond end of device 10:54:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001040c00000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009004000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 679.238920] loop4: rw=12288, want=8200, limit=12 10:54:36 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x6}, 0x0) [ 679.267955] attempt to access beyond end of device [ 679.304645] loop4: rw=12288, want=4104, limit=12 [ 679.331741] attempt to access beyond end of device 10:54:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000002000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 679.353435] loop4: rw=12288, want=8200, limit=12 10:54:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001040d00000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 679.419780] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 679.450086] attempt to access beyond end of device [ 679.460238] loop4: rw=12288, want=4104, limit=12 [ 679.486014] attempt to access beyond end of device [ 679.499796] loop4: rw=12288, want=8200, limit=12 [ 679.521558] attempt to access beyond end of device [ 679.541058] loop4: rw=12288, want=4104, limit=12 [ 679.559100] attempt to access beyond end of device [ 679.570174] loop4: rw=12288, want=8200, limit=12 10:54:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x6c00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009004800030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:36 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x8}, 0x0) 10:54:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000003000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001040e00000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:36 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201740b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:54:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000004000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 679.851643] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 679.881942] attempt to access beyond end of device [ 679.894598] loop4: rw=12288, want=4104, limit=12 10:54:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001001200000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009004c00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 679.919392] attempt to access beyond end of device 10:54:37 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x10}, 0x0) [ 679.965667] loop4: rw=12288, want=8200, limit=12 10:54:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000005000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 680.012818] attempt to access beyond end of device [ 680.044398] loop4: rw=12288, want=4104, limit=12 [ 680.058076] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 680.073683] attempt to access beyond end of device 10:54:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001001300000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 680.109541] loop4: rw=12288, want=8200, limit=12 [ 680.187483] attempt to access beyond end of device [ 680.192697] loop4: rw=12288, want=4104, limit=12 [ 680.199421] attempt to access beyond end of device [ 680.204439] loop4: rw=12288, want=8200, limit=12 [ 680.221090] attempt to access beyond end of device [ 680.229793] loop4: rw=12288, want=4104, limit=12 [ 680.237182] attempt to access beyond end of device [ 680.242200] loop4: rw=12288, want=8200, limit=12 10:54:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000006000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x6d00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009004e00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001001f00000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:37 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f2017a0b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:54:37 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x25}, 0x0) 10:54:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001002000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 680.543207] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 680.563482] attempt to access beyond end of device [ 680.582853] loop4: rw=12288, want=4104, limit=12 [ 680.596945] attempt to access beyond end of device 10:54:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000030004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009006000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 680.627783] loop4: rw=12288, want=8200, limit=12 10:54:37 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x60}, 0x0) [ 680.683714] attempt to access beyond end of device [ 680.708344] loop4: rw=12288, want=4104, limit=12 [ 680.730065] attempt to access beyond end of device 10:54:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000080040004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001002200000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 680.754683] loop4: rw=12288, want=8200, limit=12 [ 680.767412] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:54:38 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x300}, 0x0) [ 680.851144] attempt to access beyond end of device [ 680.860932] loop4: rw=12288, want=4104, limit=12 [ 680.892550] attempt to access beyond end of device [ 680.918412] loop4: rw=12288, want=8200, limit=12 10:54:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000050004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 680.940714] attempt to access beyond end of device [ 680.965655] loop4: rw=12288, want=4104, limit=12 [ 680.988446] attempt to access beyond end of device [ 681.011834] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 681.020403] loop4: rw=12288, want=8200, limit=12 10:54:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x6e00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001002300000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009006800030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:38 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x72d5d919}, 0x0) 10:54:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000060004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:38 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f20100120009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) [ 681.348934] attempt to access beyond end of device [ 681.370204] loop4: rw=12288, want=4104, limit=12 10:54:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001b22600000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:38 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x72d5d91f}, 0x0) [ 681.392853] attempt to access beyond end of device 10:54:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f0000000000000000001f0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 681.429506] loop4: rw=12288, want=8200, limit=12 [ 681.454873] attempt to access beyond end of device 10:54:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009006c00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001c62600000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 681.498445] loop4: rw=12288, want=4104, limit=12 [ 681.516795] attempt to access beyond end of device [ 681.525362] loop4: rw=12288, want=8200, limit=12 10:54:38 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0xffffff1f}, 0x0) [ 681.616823] attempt to access beyond end of device [ 681.622291] loop4: rw=12288, want=4104, limit=12 [ 681.637230] attempt to access beyond end of device [ 681.642803] loop4: rw=12288, want=8200, limit=12 [ 681.655691] attempt to access beyond end of device [ 681.661326] loop4: rw=12288, want=4104, limit=12 [ 681.682005] attempt to access beyond end of device [ 681.724670] loop4: rw=12288, want=8200, limit=12 10:54:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x6f00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000200004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009007400030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001002c00000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:39 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x2}, 0x0) 10:54:39 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f20100140009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:54:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f0000000000000000003f0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 682.033091] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 682.079495] attempt to access beyond end of device [ 682.086041] loop4: rw=12288, want=4104, limit=12 [ 682.114270] attempt to access beyond end of device 10:54:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001003f00000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:39 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x3}, 0x0) 10:54:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009007a00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 682.135045] loop4: rw=12288, want=8200, limit=12 [ 682.147473] attempt to access beyond end of device [ 682.157666] loop4: rw=12288, want=4104, limit=12 [ 682.172812] attempt to access beyond end of device 10:54:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000400004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 682.224603] loop4: rw=12288, want=8200, limit=12 10:54:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001004000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 682.280766] attempt to access beyond end of device [ 682.287415] loop4: rw=12288, want=4104, limit=12 [ 682.303160] attempt to access beyond end of device [ 682.312839] loop4: rw=12288, want=8200, limit=12 [ 682.316114] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 682.318645] attempt to access beyond end of device [ 682.340346] loop4: rw=12288, want=4104, limit=12 [ 682.376019] attempt to access beyond end of device [ 682.404296] loop4: rw=12288, want=8200, limit=12 [ 682.426864] f2fs_msg: 228 callbacks suppressed [ 682.426874] F2FS-fs (loop4): Failed to get valid F2FS checkpoint [ 682.635239] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x8100000) [ 682.643902] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 682.652323] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 682.659701] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock [ 682.667882] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x8100000) [ 682.675490] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 682.683872] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 682.691669] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock 10:54:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x7000, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000004800004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:39 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x4}, 0x0) 10:54:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009f87f00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001004800000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:39 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201017c0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:54:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000005000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 682.857874] F2FS-fs (loop5): Invalid log sectorsize (8386569) [ 682.860556] attempt to access beyond end of device [ 682.885006] loop4: rw=12288, want=4104, limit=12 [ 682.890437] attempt to access beyond end of device [ 682.895537] loop4: rw=12288, want=8200, limit=12 10:54:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001004c00000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:40 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x5}, 0x0) [ 682.966879] attempt to access beyond end of device 10:54:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009019a00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 682.995370] loop4: rw=12288, want=4104, limit=12 [ 683.027636] attempt to access beyond end of device [ 683.053806] loop4: rw=12288, want=8200, limit=12 10:54:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f00000000000000000000000b000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001006000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 683.147500] attempt to access beyond end of device [ 683.152897] loop4: rw=12288, want=4104, limit=12 [ 683.186172] attempt to access beyond end of device [ 683.211887] loop4: rw=12288, want=8200, limit=12 [ 683.246286] attempt to access beyond end of device [ 683.265155] loop4: rw=12288, want=4104, limit=12 [ 683.289319] attempt to access beyond end of device [ 683.294342] loop4: rw=12288, want=8200, limit=12 10:54:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x7100, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:40 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x6}, 0x0) 10:54:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000926eb00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000e80f00000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001006800000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:40 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f2010fe00009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:54:40 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x7}, 0x0) 10:54:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000088000000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001006c00000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 683.615098] attempt to access beyond end of device [ 683.623913] loop4: rw=12288, want=4104, limit=12 [ 683.635579] attempt to access beyond end of device [ 683.656313] loop4: rw=12288, want=8200, limit=12 [ 683.712293] attempt to access beyond end of device 10:54:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000926ed00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 683.745463] loop4: rw=12288, want=4104, limit=12 10:54:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000020004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 683.773410] attempt to access beyond end of device [ 683.791010] nla_parse: 3 callbacks suppressed [ 683.791020] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 683.794054] loop4: rw=12288, want=8200, limit=12 10:54:41 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x8}, 0x0) [ 683.924370] attempt to access beyond end of device [ 683.938826] loop4: rw=12288, want=4104, limit=12 [ 683.965770] attempt to access beyond end of device [ 683.981955] loop4: rw=12288, want=8200, limit=12 [ 683.993866] attempt to access beyond end of device [ 684.009933] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 684.038983] loop4: rw=12288, want=4104, limit=12 [ 684.055763] attempt to access beyond end of device [ 684.067777] loop4: rw=12288, want=8200, limit=12 10:54:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x7200, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001007400000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000903f600030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000030004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:41 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0xa}, 0x0) 10:54:41 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f20100050009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:54:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000040004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 684.337982] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:54:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001007a00000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 684.415117] attempt to access beyond end of device 10:54:41 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0xe}, 0x0) 10:54:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00097ff800030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 684.478457] loop4: rw=12288, want=4104, limit=12 10:54:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000050004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 684.510683] attempt to access beyond end of device [ 684.529103] loop4: rw=12288, want=8200, limit=12 [ 684.549858] attempt to access beyond end of device [ 684.566423] loop4: rw=12288, want=4104, limit=12 10:54:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000126b200000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 684.587834] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 684.595274] attempt to access beyond end of device [ 684.611252] loop4: rw=12288, want=8200, limit=12 [ 684.670618] attempt to access beyond end of device [ 684.687688] loop4: rw=12288, want=4104, limit=12 [ 684.714595] attempt to access beyond end of device [ 684.750077] loop4: rw=12288, want=8200, limit=12 [ 684.762615] attempt to access beyond end of device [ 684.789987] loop4: rw=12288, want=4104, limit=12 [ 684.794977] attempt to access beyond end of device [ 684.810455] loop4: rw=12288, want=8200, limit=12 10:54:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x7300, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000060004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:42 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0xf}, 0x0) 10:54:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090ffc00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000126c600000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:42 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f20100100009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) [ 685.113339] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 685.125335] attempt to access beyond end of device [ 685.136235] loop4: rw=12288, want=4104, limit=12 [ 685.151073] attempt to access beyond end of device [ 685.167447] loop4: rw=12288, want=8200, limit=12 [ 685.185056] attempt to access beyond end of device 10:54:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001c0ed00000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000901fe00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:42 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x48}, 0x0) 10:54:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000304000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 685.209998] loop4: rw=12288, want=4104, limit=12 [ 685.228129] attempt to access beyond end of device [ 685.247192] loop4: rw=12288, want=8200, limit=12 [ 685.330498] attempt to access beyond end of device [ 685.338927] loop4: rw=12288, want=4104, limit=12 [ 685.342162] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 685.364802] attempt to access beyond end of device 10:54:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000103fa00000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 685.383936] loop4: rw=12288, want=8200, limit=12 [ 685.410718] attempt to access beyond end of device 10:54:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000800404000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 685.439085] loop4: rw=12288, want=4104, limit=12 [ 685.465262] attempt to access beyond end of device [ 685.492797] loop4: rw=12288, want=8200, limit=12 10:54:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x7400, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090fff00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:42 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x4c}, 0x0) 10:54:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000101fe00000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:42 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f20100120009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:54:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000504000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 685.778177] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:54:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000001000000010fff00000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000604000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 685.863304] attempt to access beyond end of device [ 685.901467] loop4: rw=12288, want=4104, limit=12 10:54:43 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x60}, 0x0) 10:54:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000040000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 685.943806] attempt to access beyond end of device [ 685.961161] loop4: rw=12288, want=8200, limit=12 [ 685.989238] attempt to access beyond end of device [ 686.015005] loop4: rw=12288, want=4104, limit=12 10:54:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000002000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000001f04000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 686.039091] attempt to access beyond end of device [ 686.068183] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 686.082977] loop4: rw=12288, want=8200, limit=12 [ 686.145432] attempt to access beyond end of device [ 686.154331] loop4: rw=12288, want=4104, limit=12 [ 686.187895] attempt to access beyond end of device [ 686.202127] loop4: rw=12288, want=8200, limit=12 [ 686.221092] attempt to access beyond end of device [ 686.239927] loop4: rw=12288, want=4104, limit=12 [ 686.254124] attempt to access beyond end of device [ 686.269213] loop4: rw=12288, want=8200, limit=12 10:54:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x7500, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000070000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000002004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000004000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:43 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x68}, 0x0) 10:54:43 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f20100140009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:54:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000010000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000080000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000003f04000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 686.613813] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 686.634950] attempt to access beyond end of device [ 686.658691] loop4: rw=12288, want=4104, limit=12 [ 686.680289] attempt to access beyond end of device 10:54:43 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x6c}, 0x0) [ 686.725087] loop4: rw=12288, want=8200, limit=12 [ 686.751548] attempt to access beyond end of device [ 686.780848] loop4: rw=12288, want=4104, limit=12 10:54:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001ffff1f000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 686.802783] attempt to access beyond end of device [ 686.828208] loop4: rw=12288, want=8200, limit=12 10:54:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000004004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 686.861092] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 686.916330] attempt to access beyond end of device [ 686.921308] loop4: rw=12288, want=4104, limit=12 [ 686.967482] attempt to access beyond end of device [ 686.972454] loop4: rw=12288, want=8200, limit=12 [ 687.017681] attempt to access beyond end of device [ 687.022676] loop4: rw=12288, want=4104, limit=12 [ 687.036652] attempt to access beyond end of device [ 687.041610] loop4: rw=12288, want=8200, limit=12 10:54:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000048004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000090000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000040000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:44 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x74}, 0x0) 10:54:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x7600, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:44 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201007c0109000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:54:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000003000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:44 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x7a}, 0x0) 10:54:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000001000000016b6b6b000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 687.396078] attempt to access beyond end of device [ 687.414595] loop4: rw=12288, want=4104, limit=12 10:54:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090000000a0000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 687.465564] attempt to access beyond end of device 10:54:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000204000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 687.505909] loop4: rw=12288, want=8200, limit=12 [ 687.524314] f2fs_msg: 209 callbacks suppressed [ 687.524325] F2FS-fs (loop4): Failed to get valid F2FS checkpoint [ 687.558780] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 687.582025] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock 10:54:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000010000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:44 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0xf0}, 0x0) [ 687.613065] attempt to access beyond end of device [ 687.618550] F2FS-fs (loop5): Invalid log sectors per block(10) log sectorsize(9) [ 687.639275] loop4: rw=12288, want=4104, limit=12 [ 687.649812] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 687.662617] attempt to access beyond end of device 10:54:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000304000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 687.697086] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 687.702197] loop4: rw=12288, want=8200, limit=12 10:54:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000020000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 687.740716] F2FS-fs (loop4): Failed to get valid F2FS checkpoint [ 687.747551] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock [ 687.778406] F2FS-fs (loop5): Invalid log sectors per block(10) log sectorsize(9) [ 687.811181] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 687.835065] attempt to access beyond end of device [ 687.851847] loop4: rw=12288, want=4104, limit=12 10:54:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000404000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 687.882170] attempt to access beyond end of device [ 687.915667] loop4: rw=12288, want=8200, limit=12 [ 687.943522] attempt to access beyond end of device [ 687.960655] loop4: rw=12288, want=4104, limit=12 [ 687.977985] attempt to access beyond end of device [ 687.998632] loop4: rw=12288, want=8200, limit=12 10:54:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x7700, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:45 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x300}, 0x0) 10:54:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000030000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090000000f0000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000504000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:45 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f20100e00f09000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) [ 688.249025] attempt to access beyond end of device [ 688.267929] loop4: rw=12288, want=4104, limit=12 [ 688.296026] attempt to access beyond end of device 10:54:45 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x500}, 0x0) 10:54:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000004030000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 688.320272] loop4: rw=12288, want=8200, limit=12 10:54:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000604000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 688.352035] attempt to access beyond end of device [ 688.400915] loop4: rw=12288, want=4104, limit=12 10:54:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000100000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 688.423778] attempt to access beyond end of device [ 688.451013] loop4: rw=12288, want=8200, limit=12 10:54:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000040000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:45 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x600}, 0x0) [ 688.530775] attempt to access beyond end of device [ 688.538611] loop4: rw=12288, want=4104, limit=12 [ 688.543570] attempt to access beyond end of device [ 688.550472] loop4: rw=12288, want=8200, limit=12 [ 688.566428] attempt to access beyond end of device [ 688.586307] loop4: rw=12288, want=4104, limit=12 [ 688.603594] attempt to access beyond end of device [ 688.631370] loop4: rw=12288, want=8200, limit=12 10:54:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x7800, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000005000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000140000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000004040000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:45 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x700}, 0x0) 10:54:45 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0209000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:54:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f00000000000000000000000b000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 688.941498] nla_parse: 6 callbacks suppressed [ 688.941508] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 688.979662] attempt to access beyond end of device [ 688.984669] loop4: rw=12288, want=4104, limit=12 10:54:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000320000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:46 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0xa00}, 0x0) [ 689.069701] attempt to access beyond end of device 10:54:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000050000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 689.097956] loop4: rw=12288, want=8200, limit=12 [ 689.138135] attempt to access beyond end of device 10:54:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090000003f0000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000000800800000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 689.158630] loop4: rw=12288, want=4104, limit=12 [ 689.170947] attempt to access beyond end of device [ 689.180199] loop4: rw=12288, want=8200, limit=12 [ 689.185236] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 689.284435] attempt to access beyond end of device [ 689.293109] loop4: rw=12288, want=4104, limit=12 [ 689.325078] attempt to access beyond end of device [ 689.350221] loop4: rw=12288, want=8200, limit=12 [ 689.371821] attempt to access beyond end of device [ 689.407943] loop4: rw=12288, want=4104, limit=12 [ 689.418205] attempt to access beyond end of device [ 689.432340] loop4: rw=12288, want=8200, limit=12 10:54:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x7900, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000004050000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:46 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0xa6e}, 0x0) 10:54:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f0000000000000000000000000fe800000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090000004e0000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:46 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0309000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:54:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000002000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 689.715279] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 689.747632] attempt to access beyond end of device [ 689.769906] loop4: rw=12288, want=4104, limit=12 10:54:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000530000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 689.795274] attempt to access beyond end of device 10:54:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000060000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:46 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0xe00}, 0x0) [ 689.824991] loop4: rw=12288, want=8200, limit=12 [ 689.863846] attempt to access beyond end of device [ 689.890283] loop4: rw=12288, want=4104, limit=12 10:54:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000003000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 689.914962] attempt to access beyond end of device [ 689.941931] loop4: rw=12288, want=8200, limit=12 10:54:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000004060000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 689.962670] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 690.041891] attempt to access beyond end of device [ 690.048275] loop4: rw=12288, want=4104, limit=12 [ 690.069766] attempt to access beyond end of device [ 690.092940] loop4: rw=12288, want=8200, limit=12 [ 690.112417] attempt to access beyond end of device [ 690.133534] loop4: rw=12288, want=4104, limit=12 [ 690.151191] attempt to access beyond end of device [ 690.165461] loop4: rw=12288, want=8200, limit=12 10:54:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x7a00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000005000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:47 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0xf00}, 0x0) 10:54:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000003d00000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000070000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:47 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0409000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:54:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f00000000000000000000000b000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 690.491832] attempt to access beyond end of device [ 690.502264] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 690.515529] loop4: rw=12288, want=4104, limit=12 [ 690.533923] attempt to access beyond end of device 10:54:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000004070000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 690.580118] loop4: rw=12288, want=8200, limit=12 [ 690.603629] attempt to access beyond end of device 10:54:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900007fff0000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:47 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x1f00}, 0x0) [ 690.639185] loop4: rw=12288, want=4104, limit=12 [ 690.659622] attempt to access beyond end of device 10:54:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004020000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 690.688457] loop4: rw=12288, want=8200, limit=12 [ 690.755275] attempt to access beyond end of device [ 690.762424] loop4: rw=12288, want=4104, limit=12 [ 690.783120] attempt to access beyond end of device [ 690.815542] loop4: rw=12288, want=8200, limit=12 [ 690.841353] attempt to access beyond end of device [ 690.858777] loop4: rw=12288, want=4104, limit=12 [ 690.874892] attempt to access beyond end of device [ 690.893517] loop4: rw=12288, want=8200, limit=12 10:54:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004030000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 690.960499] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:54:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x7b00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:48 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0509000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:54:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00097fffffff0000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:48 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x2000}, 0x0) 10:54:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000004080000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004040000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004050000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000090000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 691.311915] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 691.324779] attempt to access beyond end of device 10:54:48 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x3f00}, 0x0) [ 691.363522] loop4: rw=12288, want=4104, limit=12 [ 691.382669] attempt to access beyond end of device [ 691.399921] loop4: rw=12288, want=8200, limit=12 [ 691.421536] attempt to access beyond end of device 10:54:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000200030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 691.443293] loop4: rw=12288, want=4104, limit=12 [ 691.459590] attempt to access beyond end of device [ 691.477433] loop4: rw=12288, want=8200, limit=12 10:54:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004060000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000004090000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 691.515205] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 691.545590] attempt to access beyond end of device [ 691.557373] loop4: rw=12288, want=4104, limit=12 [ 691.575056] attempt to access beyond end of device [ 691.602031] loop4: rw=12288, want=8200, limit=12 [ 691.624623] attempt to access beyond end of device [ 691.640261] loop4: rw=12288, want=4104, limit=12 [ 691.653353] attempt to access beyond end of device [ 691.683360] loop4: rw=12288, want=8200, limit=12 10:54:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000300000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:49 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x4800}, 0x0) 10:54:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000001000000010000040a0000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000300030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x7c00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:49 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0609000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) [ 691.975323] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 692.011509] attempt to access beyond end of device 10:54:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004800400000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 692.027146] loop4: rw=12288, want=4104, limit=12 [ 692.060299] attempt to access beyond end of device 10:54:49 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x4c00}, 0x0) 10:54:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000001000000010000040b0000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 692.082993] loop4: rw=12288, want=8200, limit=12 [ 692.100083] attempt to access beyond end of device [ 692.117257] loop4: rw=12288, want=4104, limit=12 10:54:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000400030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 692.148534] attempt to access beyond end of device [ 692.174613] loop4: rw=12288, want=8200, limit=12 10:54:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000500000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 692.248106] attempt to access beyond end of device [ 692.253466] loop4: rw=12288, want=4104, limit=12 [ 692.264388] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 692.280070] attempt to access beyond end of device 10:54:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000001000000010000000c0000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 692.302825] loop4: rw=12288, want=8200, limit=12 [ 692.335796] attempt to access beyond end of device 10:54:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000500030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000600000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 692.361611] loop4: rw=12288, want=4104, limit=12 10:54:49 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x6000}, 0x0) [ 692.386072] attempt to access beyond end of device [ 692.400330] loop4: rw=12288, want=8200, limit=12 10:54:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000001000000010000040c0000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 692.690364] f2fs_msg: 220 callbacks suppressed [ 692.690380] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x8100000) [ 692.704129] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 692.713219] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 692.721047] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock [ 692.733107] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x8100000) [ 692.747007] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 692.754571] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 692.761895] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock 10:54:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x7d00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004001f00000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:49 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0709000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:54:49 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x6800}, 0x0) 10:54:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000001000000010000040d0000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000600030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 692.873787] F2FS-fs (loop4): Unable to read 2th superblock [ 692.882525] attempt to access beyond end of device [ 692.896657] F2FS-fs (loop5): Invalid log sectorsize (393225) 10:54:50 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x6c00}, 0x0) 10:54:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004002000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 692.921731] loop4: rw=12288, want=4104, limit=12 [ 692.936803] attempt to access beyond end of device [ 692.943032] loop4: rw=12288, want=8200, limit=12 10:54:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000001000000010000040e0000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 692.968452] attempt to access beyond end of device [ 692.985278] loop4: rw=12288, want=4104, limit=12 [ 693.001567] attempt to access beyond end of device 10:54:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000700030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 693.028011] loop4: rw=12288, want=8200, limit=12 10:54:50 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x6e0a}, 0x0) [ 693.106045] attempt to access beyond end of device [ 693.111147] loop4: rw=12288, want=4104, limit=12 [ 693.143572] attempt to access beyond end of device 10:54:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004003f00000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 693.158959] loop4: rw=12288, want=8200, limit=12 [ 693.170502] attempt to access beyond end of device [ 693.184469] loop4: rw=12288, want=4104, limit=12 [ 693.203003] attempt to access beyond end of device [ 693.225022] loop4: rw=12288, want=8200, limit=12 10:54:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x7e00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000120000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000900030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:50 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0909000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:54:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004004000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:50 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x7400}, 0x0) 10:54:50 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x7a00}, 0x0) 10:54:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004048000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000130000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000c00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 693.667890] attempt to access beyond end of device [ 693.677536] loop4: rw=12288, want=4104, limit=12 [ 693.695368] attempt to access beyond end of device [ 693.712384] loop4: rw=12288, want=8200, limit=12 [ 693.747859] attempt to access beyond end of device [ 693.767879] loop4: rw=12288, want=4104, limit=12 [ 693.788592] attempt to access beyond end of device 10:54:50 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0xf000}, 0x0) [ 693.816540] loop4: rw=12288, want=8200, limit=12 10:54:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000008000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 693.919164] attempt to access beyond end of device [ 693.924659] loop4: rw=12288, want=4104, limit=12 [ 693.942396] attempt to access beyond end of device [ 693.971841] loop4: rw=12288, want=8200, limit=12 [ 693.990451] attempt to access beyond end of device [ 694.005361] loop4: rw=12288, want=4104, limit=12 [ 694.024085] attempt to access beyond end of device [ 694.041075] loop4: rw=12288, want=8200, limit=12 10:54:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x7f00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000001000000010000001f0000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:51 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x30000}, 0x0) 10:54:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009001000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f0000000000000000000000046b6b6b000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:51 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0a09000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:54:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000010002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 694.314799] nla_parse: 7 callbacks suppressed [ 694.314811] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:54:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000200000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:51 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x34000}, 0x0) [ 694.407567] attempt to access beyond end of device [ 694.431643] loop4: rw=12288, want=4104, limit=12 10:54:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009002200030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000020002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 694.454747] attempt to access beyond end of device 10:54:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000220000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 694.503354] loop4: rw=12288, want=8200, limit=12 [ 694.541720] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 694.545248] attempt to access beyond end of device [ 694.592983] loop4: rw=12288, want=4104, limit=12 [ 694.636129] attempt to access beyond end of device [ 694.670000] loop4: rw=12288, want=8200, limit=12 10:54:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x8100, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000030002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:52 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x400300}, 0x0) 10:54:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000230000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009002300030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 694.813351] attempt to access beyond end of device [ 694.824500] loop4: rw=12288, want=4104, limit=12 [ 694.829838] attempt to access beyond end of device [ 694.834785] loop4: rw=12288, want=8200, limit=12 [ 694.840827] attempt to access beyond end of device [ 694.846462] loop4: rw=12288, want=4104, limit=12 [ 694.851301] attempt to access beyond end of device [ 694.858432] loop4: rw=12288, want=8200, limit=12 10:54:52 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0c09000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) [ 694.969868] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:54:52 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0xf0ffff}, 0x0) 10:54:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000040002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000001000000010000002c0000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 695.115737] attempt to access beyond end of device 10:54:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009002c00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000050002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 695.166005] loop4: rw=12288, want=4104, limit=12 [ 695.183206] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 695.199450] attempt to access beyond end of device [ 695.219249] loop4: rw=12288, want=8200, limit=12 [ 695.239117] attempt to access beyond end of device [ 695.261423] loop4: rw=12288, want=4104, limit=12 10:54:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000001000000010000003f0000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 695.295566] attempt to access beyond end of device [ 695.323648] loop4: rw=12288, want=8200, limit=12 [ 695.403483] attempt to access beyond end of device [ 695.410389] loop4: rw=12288, want=4104, limit=12 [ 695.428808] attempt to access beyond end of device [ 695.448914] loop4: rw=12288, want=8200, limit=12 [ 695.464682] attempt to access beyond end of device [ 695.475515] loop4: rw=12288, want=4104, limit=12 [ 695.487800] attempt to access beyond end of device [ 695.502054] loop4: rw=12288, want=8200, limit=12 10:54:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x8200, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:52 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x1000000}, 0x0) 10:54:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009004800030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000060002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000400000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:52 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b2209000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) [ 695.721417] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:54:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f0000000000000000000000040000001f0002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000480000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 695.806633] attempt to access beyond end of device [ 695.817065] loop4: rw=12288, want=4104, limit=12 10:54:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009004c00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:53 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x2000000}, 0x0) [ 695.864622] attempt to access beyond end of device [ 695.903521] loop4: rw=12288, want=8200, limit=12 [ 695.923359] attempt to access beyond end of device [ 695.948041] loop4: rw=12288, want=4104, limit=12 10:54:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000200002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 695.969893] attempt to access beyond end of device [ 696.000535] loop4: rw=12288, want=8200, limit=12 [ 696.012372] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:54:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000001000000010000004c0000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 696.077737] attempt to access beyond end of device [ 696.082739] loop4: rw=12288, want=4104, limit=12 [ 696.114696] attempt to access beyond end of device [ 696.147586] loop4: rw=12288, want=8200, limit=12 [ 696.192645] attempt to access beyond end of device [ 696.222540] loop4: rw=12288, want=4104, limit=12 [ 696.247550] attempt to access beyond end of device [ 696.261764] loop4: rw=12288, want=8200, limit=12 10:54:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x8300, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009004e00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f0000000000000000000000040000003f0002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:53 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x3000000}, 0x0) 10:54:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000600000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:53 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b2309000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) [ 696.433106] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:54:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000400002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:53 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x4000000}, 0x0) 10:54:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000680000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 696.548941] attempt to access beyond end of device [ 696.553922] loop4: rw=12288, want=4104, limit=12 10:54:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009006000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 696.589118] attempt to access beyond end of device [ 696.623301] loop4: rw=12288, want=8200, limit=12 [ 696.637921] attempt to access beyond end of device [ 696.647207] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 696.662730] loop4: rw=12288, want=4104, limit=12 [ 696.680397] attempt to access beyond end of device 10:54:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004006b6b6b0002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:53 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x5000000}, 0x0) [ 696.701659] loop4: rw=12288, want=8200, limit=12 [ 696.768167] attempt to access beyond end of device [ 696.780531] loop4: rw=12288, want=4104, limit=12 [ 696.832788] attempt to access beyond end of device [ 696.851215] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 696.898246] loop4: rw=12288, want=8200, limit=12 [ 696.915306] attempt to access beyond end of device [ 696.936901] loop4: rw=12288, want=4104, limit=12 [ 696.947400] attempt to access beyond end of device [ 696.957959] loop4: rw=12288, want=8200, limit=12 10:54:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x8400, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001006b6b6b0000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009006800030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000004800002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:54 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x6000000}, 0x0) 10:54:54 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b2c09000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) [ 697.209178] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 697.262017] attempt to access beyond end of device 10:54:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004ffffffeb0002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:54 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x7000000}, 0x0) [ 697.284136] loop4: rw=12288, want=4104, limit=12 10:54:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000001000000010000006c0000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009006c00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 697.313934] attempt to access beyond end of device [ 697.333085] loop4: rw=12288, want=8200, limit=12 [ 697.402314] attempt to access beyond end of device [ 697.426720] loop4: rw=12288, want=4104, limit=12 10:54:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004fffffff60002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000740000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 697.449251] attempt to access beyond end of device [ 697.464162] loop4: rw=12288, want=8200, limit=12 [ 697.568787] attempt to access beyond end of device [ 697.575199] loop4: rw=12288, want=4104, limit=12 [ 697.587283] attempt to access beyond end of device [ 697.598036] loop4: rw=12288, want=8200, limit=12 [ 697.609360] attempt to access beyond end of device [ 697.625916] loop4: rw=12288, want=4104, limit=12 [ 697.649215] attempt to access beyond end of device [ 697.680280] loop4: rw=12288, want=8200, limit=12 [ 697.700750] f2fs_msg: 221 callbacks suppressed [ 697.700761] F2FS-fs (loop4): Failed to get valid F2FS checkpoint [ 697.771150] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x8100000) [ 697.779175] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 697.788323] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 697.795453] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock [ 697.804470] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x8100000) [ 697.812710] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock 10:54:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x8500, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:54 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x8000000}, 0x0) 10:54:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004fffffdfc0002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009007400030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000001000000010000007a0000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:54 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b4809000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) [ 697.822070] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 697.829928] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock 10:54:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004fffffffe0002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:55 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0xa000000}, 0x0) [ 698.006963] F2FS-fs (loop4): Unable to read 2th superblock [ 698.012874] attempt to access beyond end of device [ 698.042926] loop4: rw=12288, want=4104, limit=12 [ 698.084857] attempt to access beyond end of device 10:54:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001ffffff8c0000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009007a00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 698.115779] loop4: rw=12288, want=8200, limit=12 [ 698.155278] attempt to access beyond end of device 10:54:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004fcfdffff0002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:55 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0xe000000}, 0x0) [ 698.177258] loop4: rw=12288, want=4104, limit=12 [ 698.190228] attempt to access beyond end of device [ 698.205944] loop4: rw=12288, want=8200, limit=12 [ 698.294657] attempt to access beyond end of device [ 698.316781] loop4: rw=12288, want=4104, limit=12 [ 698.322041] attempt to access beyond end of device [ 698.346012] loop4: rw=12288, want=8200, limit=12 [ 698.351266] attempt to access beyond end of device [ 698.373571] loop4: rw=12288, want=4104, limit=12 [ 698.430550] attempt to access beyond end of device [ 698.458789] loop4: rw=12288, want=8200, limit=12 10:54:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x8600, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004ebffffff0002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000026b20000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:55 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0xf000000}, 0x0) 10:54:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000401030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:55 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b4c09000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:54:55 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x1f000000}, 0x0) 10:54:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004f6ffffff0002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000001000000010000edc00000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 698.748585] attempt to access beyond end of device [ 698.803879] loop4: rw=12288, want=4104, limit=12 10:54:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009009a01030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 698.832381] attempt to access beyond end of device [ 698.860504] loop4: rw=12288, want=8200, limit=12 [ 698.881872] attempt to access beyond end of device [ 698.908796] loop4: rw=12288, want=4104, limit=12 10:54:56 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x20000000}, 0x0) 10:54:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004feffffff0002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 698.930282] attempt to access beyond end of device [ 698.966028] loop4: rw=12288, want=8200, limit=12 [ 699.044239] attempt to access beyond end of device [ 699.061752] loop4: rw=12288, want=4104, limit=12 [ 699.086441] attempt to access beyond end of device [ 699.101794] loop4: rw=12288, want=8200, limit=12 [ 699.133390] attempt to access beyond end of device [ 699.143410] loop4: rw=12288, want=4104, limit=12 [ 699.150724] attempt to access beyond end of device [ 699.190566] loop4: rw=12288, want=8200, limit=12 10:54:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x8700, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000026c60000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900fe01030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:56 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x3f000000}, 0x0) 10:54:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000200000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:56 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b6809000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:54:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001fffffff50000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000300000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 699.462994] nla_parse: 7 callbacks suppressed [ 699.463004] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 699.516779] attempt to access beyond end of device [ 699.531907] loop4: rw=12288, want=4104, limit=12 [ 699.572720] attempt to access beyond end of device [ 699.594226] loop4: rw=12288, want=8200, limit=12 10:54:56 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x48000000}, 0x0) [ 699.615257] attempt to access beyond end of device 10:54:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000402030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 699.638828] loop4: rw=12288, want=4104, limit=12 10:54:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001fffffff60000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000400000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 699.668968] attempt to access beyond end of device [ 699.701883] loop4: rw=12288, want=8200, limit=12 [ 699.734785] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 699.769091] attempt to access beyond end of device [ 699.774137] loop4: rw=12288, want=4104, limit=12 [ 699.798740] attempt to access beyond end of device [ 699.826910] loop4: rw=12288, want=8200, limit=12 [ 699.851108] attempt to access beyond end of device [ 699.880956] loop4: rw=12288, want=4104, limit=12 [ 699.902421] attempt to access beyond end of device [ 699.907496] loop4: rw=12288, want=8200, limit=12 10:54:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000500000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000003fa0000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:57 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x4c000000}, 0x0) 10:54:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000003030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x8800, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:57 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b6c09000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) [ 700.131380] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:54:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000001fe0000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:57 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x60000000}, 0x0) 10:54:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000600000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 700.245067] attempt to access beyond end of device [ 700.265336] loop4: rw=12288, want=4104, limit=12 [ 700.292397] attempt to access beyond end of device 10:54:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000403030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 700.323771] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 700.333832] loop4: rw=12288, want=8200, limit=12 [ 700.346638] attempt to access beyond end of device 10:54:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000003000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001fffffffe0000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:57 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x68000000}, 0x0) [ 700.370475] loop4: rw=12288, want=4104, limit=12 [ 700.388389] attempt to access beyond end of device [ 700.403642] loop4: rw=12288, want=8200, limit=12 10:54:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004008004000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100000fff0000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 700.520558] attempt to access beyond end of device [ 700.525709] loop4: rw=12288, want=4104, limit=12 [ 700.542631] attempt to access beyond end of device 10:54:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900f603030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 700.571343] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 700.587424] loop4: rw=12288, want=8200, limit=12 [ 700.606570] attempt to access beyond end of device [ 700.623279] loop4: rw=12288, want=4104, limit=12 [ 700.647015] attempt to access beyond end of device [ 700.670258] loop4: rw=12288, want=8200, limit=12 10:54:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x8900, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:58 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x6c000000}, 0x0) 10:54:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000005000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001001fffff0000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:58 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b7409000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:54:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000204030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 701.067295] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:54:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000006000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 701.137550] attempt to access beyond end of device 10:54:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000001000000017fffffff0000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000304030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 701.186431] loop4: rw=12288, want=4104, limit=12 10:54:58 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x6e0a0000}, 0x0) [ 701.216217] attempt to access beyond end of device [ 701.235938] loop4: rw=12288, want=8200, limit=12 [ 701.266787] attempt to access beyond end of device [ 701.296668] loop4: rw=12288, want=4104, limit=12 10:54:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000001000000018cffffff0000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 701.331531] attempt to access beyond end of device 10:54:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f00000000000000000000000400001f000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 701.364324] loop4: rw=12288, want=8200, limit=12 [ 701.388064] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 701.427616] attempt to access beyond end of device [ 701.433850] loop4: rw=12288, want=4104, limit=12 [ 701.469663] attempt to access beyond end of device [ 701.501084] loop4: rw=12288, want=8200, limit=12 [ 701.528255] attempt to access beyond end of device [ 701.553156] loop4: rw=12288, want=4104, limit=12 [ 701.564635] attempt to access beyond end of device [ 701.581473] loop4: rw=12288, want=8200, limit=12 10:54:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x8a00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000404030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:58 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x74000000}, 0x0) 10:54:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001f5ffffff0000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000020000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:58 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b7a09000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) [ 701.890928] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 701.925545] attempt to access beyond end of device 10:54:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f00000000000000000000000400003f000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 701.961143] loop4: rw=12288, want=4104, limit=12 10:54:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001f6ffffff0000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000504030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 701.999728] attempt to access beyond end of device 10:54:59 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x7a000000}, 0x0) [ 702.049857] loop4: rw=12288, want=8200, limit=12 [ 702.080555] attempt to access beyond end of device [ 702.098918] loop4: rw=12288, want=4104, limit=12 [ 702.120924] attempt to access beyond end of device 10:54:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000040000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 702.144600] loop4: rw=12288, want=8200, limit=12 10:54:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001feffffff0000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 702.223928] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 702.274823] attempt to access beyond end of device [ 702.280651] loop4: rw=12288, want=4104, limit=12 [ 702.299232] attempt to access beyond end of device [ 702.322610] loop4: rw=12288, want=8200, limit=12 [ 702.333721] attempt to access beyond end of device [ 702.351042] loop4: rw=12288, want=4104, limit=12 [ 702.384184] attempt to access beyond end of device [ 702.393620] loop4: rw=12288, want=8200, limit=12 10:54:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x8b00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000604030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:54:59 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x9effffff}, 0x0) 10:54:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000480000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100000000c0ed000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:54:59 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0014000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:54:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000010040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 702.643592] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:54:59 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0xf0ffffff}, 0x0) 10:54:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000080002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:54:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000704030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 702.744019] f2fs_msg: 217 callbacks suppressed [ 702.744034] F2FS-fs (loop4): Invalid log sectorsize (20) [ 702.765345] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 702.817918] F2FS-fs (loop4): Unable to read 2th superblock 10:55:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000020040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 702.867803] F2FS-fs (loop4): Invalid log sectorsize (20) [ 702.900855] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock 10:55:00 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0xfffff000}, 0x0) [ 702.918992] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 702.948909] F2FS-fs (loop5): Invalid log sectorsize (67567625) [ 702.961672] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock [ 702.989617] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 703.013530] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) 10:55:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x8c00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004006b6b6b0002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:00 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0xffffff7f}, 0x0) 10:55:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000040040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000804030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:00 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b001f000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:00 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0xffffff9e}, 0x0) 10:55:00 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b03de000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000102000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000100040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000904030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:00 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0xfffffff0}, 0x0) 10:55:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x8d00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000400040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000202000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:01 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0010000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000a04030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:01 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x3000000000000}, 0x0) 10:55:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000302000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000006b6b6b0040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:01 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x40030000000000}, 0x0) 10:55:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000b04030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:01 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0014000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000402000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x8e00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000140000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:01 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0xf0ffffffffffff}, 0x0) 10:55:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000502000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:01 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00de030000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000005030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000602000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000240000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 704.864648] nla_parse: 7 callbacks suppressed [ 704.864658] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000405030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:02 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x100000000000000}, 0x0) 10:55:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000001f02000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:02 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000010000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) [ 705.018323] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x8f00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000340000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000002002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000006030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:02 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x200000000000000}, 0x0) 10:55:02 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009020000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000040340000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000003f02000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000406030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:02 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009030000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) [ 705.543222] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000440000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000004002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x9000, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:03 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x300000000000000}, 0x0) 10:55:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000040440000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f00000000000000000000000400006b6b6b02000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:03 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009040000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000007030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000540000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000048002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 706.124294] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:03 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x400000000000000}, 0x0) 10:55:03 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009050000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000407030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f00000000000000000000000400ffffffeb02000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 706.330248] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x9100, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000040540000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:03 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x500000000000000}, 0x0) 10:55:03 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009060000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f00000000000000000000000400fffffff602000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000408030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000640000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f00000000000000000000000400fffffdfc02000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 706.788459] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:04 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x600000000000000}, 0x0) 10:55:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000009030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:04 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009070000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f00000000000000000000000400fffffffe02000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 706.993302] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x9200, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000040640000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000409030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:04 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x700000000000000}, 0x0) 10:55:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f00000000000000000000000400fcfdffff02000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:04 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009090000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) [ 707.428166] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000740000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f00000000000000000000000400ebffffff02000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:04 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x800000000000000}, 0x0) 10:55:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900040a030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f00000000000000000000000400f6ffffff02000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:04 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090a0000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) [ 707.661925] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 707.771398] f2fs_msg: 332 callbacks suppressed [ 707.771409] F2FS-fs (loop4): Invalid log sectorsize (2569) [ 707.798836] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 707.818002] F2FS-fs (loop4): Unable to read 2th superblock [ 707.831764] F2FS-fs (loop4): Invalid log sectorsize (2569) [ 707.844554] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 707.868135] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 707.884522] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock 10:55:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x9300, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000040740000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f00000000000000000000000400feffffff02000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:05 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0xa00000000000000}, 0x0) 10:55:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900040b030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:05 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090c0000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) [ 708.026836] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x8100000) [ 708.034527] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 708.042578] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) 10:55:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000001000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 708.128872] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:05 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0xe00000000000000}, 0x0) 10:55:05 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009100000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000040840000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900000c030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000002000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x9400, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:05 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0xf00000000000000}, 0x0) 10:55:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000940000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:05 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009220000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000003000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900fc0f030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000040940000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000004000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:06 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x1f00000000000000}, 0x0) 10:55:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900001f030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:06 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009230000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000040a40000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x9500, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000005000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:06 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x2000000000000000}, 0x0) 10:55:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000040b40000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:06 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00092c0000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000020030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000006000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000022030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000c40000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:06 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x3f00000000000000}, 0x0) 10:55:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000030002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:06 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009480000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x9600, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000040c40000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:07 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x4800000000000000}, 0x0) 10:55:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000023030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000080040002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:07 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00094c0000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000050002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000040d40000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 710.130487] nla_parse: 5 callbacks suppressed [ 710.130497] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:07 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009680000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000060002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:07 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x4c00000000000000}, 0x0) 10:55:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900eb26030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 710.354385] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x9700, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000040e40000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f0000000000000000000000040000001f0002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:07 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00096c0000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:07 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x6000000000000000}, 0x0) 10:55:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900ed26030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000200002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 710.806428] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000001240000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900002c030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:08 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x6800000000000000}, 0x0) 10:55:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f0000000000000000000000040000003f0002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:08 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009740000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) [ 711.089147] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x9800, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000001340000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900003f030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000400002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:08 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x6c00000000000000}, 0x0) 10:55:08 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00097a0000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) [ 711.462249] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000001f40000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000004800002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:08 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x6e0a000000000000}, 0x0) 10:55:08 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009040100030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000002040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000040030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 711.724779] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x9900, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000003000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000048030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000002240000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:09 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x7400000000000000}, 0x0) 10:55:09 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00099a0100030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000006000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 712.158741] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000002340000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:09 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x7a00000000000000}, 0x0) 10:55:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000007000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:09 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009fe0100030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900004c030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 712.430831] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x9a00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000002c40000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f00000000000000000000000400000000000b000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:09 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x9effffff00000000}, 0x0) 10:55:09 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009040200030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900004e030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f00000000000000000000000400000000000f000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000003f40000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 712.829729] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 712.846224] f2fs_msg: 306 callbacks suppressed [ 712.846237] F2FS-fs (loop5): Invalid log sectorsize (1308622857) [ 712.901929] F2FS-fs (loop4): Invalid log sectorsize (132105) [ 712.930609] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 712.935172] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock 10:55:10 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0xf0ffffff00000000}, 0x0) [ 712.959117] F2FS-fs (loop4): Unable to read 2th superblock [ 712.977961] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) 10:55:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000223000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000004040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 713.014003] F2FS-fs (loop4): Invalid log sectorsize (132105) [ 713.023936] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock [ 713.045577] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 713.066567] F2FS-fs (loop5): Invalid log sectorsize (1308622857) [ 713.082810] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f00000000000000000000000400000000003f000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x9b00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:10 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0xffffff7f00000000}, 0x0) 10:55:10 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00094a0200030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000004840000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000060030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000020002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000004c40000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:10 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0xfffffffffffff000}, 0x0) 10:55:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000030002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:10 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000300030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000068030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000040002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x9c00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000006040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:11 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x2}, 0x0) 10:55:11 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009040300030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000050002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900006c030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000060002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:11 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009890300030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000074030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000006840000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:11 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x3}, 0x0) 10:55:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000302000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:11 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009fa0300030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000006c40000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:11 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x4}, 0x0) 10:55:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x9d00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900007a030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000800402000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000007440000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:12 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x5}, 0x0) 10:55:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000502000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000007a40000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:12 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009020400030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900f87f030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000602000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:12 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x6}, 0x0) 10:55:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000008040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x9e00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:12 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009030400030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000001f02000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900019a030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:12 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x7}, 0x0) 10:55:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100000000ffffff8c40000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000002002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100000000000026b240000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:12 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x8}, 0x0) 10:55:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090026eb030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000003f02000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:13 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009040400030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100000000000026c640000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:13 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0xa}, 0x0) 10:55:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090026ed030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000004002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:13 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009050400030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x9f00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000048002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100000000fffffff540000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:13 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009060400030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:13 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0xe}, 0x0) 10:55:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090003f6030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000202000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100000000fffffff640000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:13 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009070400030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:13 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0xf}, 0x0) 10:55:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009007ff8030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000302000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xa000, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100000000000003fa40000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:14 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x48}, 0x0) 10:55:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000402000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:14 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009080400030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000ffc030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000502000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090001fe030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100000000000001fe40000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:14 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009090400030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:14 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x4c}, 0x0) 10:55:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000602000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xa100, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000fff030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100000000fffffffe40000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:14 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x60}, 0x0) 10:55:14 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090a0400030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000003000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:15 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x68}, 0x0) 10:55:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000006000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 717.885555] f2fs_msg: 278 callbacks suppressed [ 717.885568] F2FS-fs (loop4): Invalid log sectorsize (264713) [ 717.887189] F2FS-fs (loop5): Invalid log sectorsize (4279173129) [ 717.918913] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock 10:55:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000001000000010000000000000fff40000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 717.947589] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 717.951877] F2FS-fs (loop4): Unable to read 2th superblock [ 717.978368] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) 10:55:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000007000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 718.017777] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock [ 718.021429] F2FS-fs (loop4): Invalid log sectorsize (264713) [ 718.048063] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 718.055711] F2FS-fs (loop5): Invalid log sectorsize (4279173129) 10:55:15 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x6c}, 0x0) 10:55:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100000000001fffff40000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xa200, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f00000000000000000000000400000000000b000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:15 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090b0400030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000002030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:15 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x74}, 0x0) 10:55:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000007fffffff40000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f00000000000000000000000400000000000f000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:15 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090c0400030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100000000ffffffff40000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000003030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:15 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x7a}, 0x0) 10:55:15 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000500030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xa300, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000223000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001ffffffffffffffff40000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:16 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0xf0}, 0x0) 10:55:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000004030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:16 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009040500030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000400000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f00000000000000000000000400000000003f000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:16 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x300}, 0x0) 10:55:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000005030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000001000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000003000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xa400, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:16 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000600030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:16 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x500}, 0x0) 10:55:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000006000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000002000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000006030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000007000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000009000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:17 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x600}, 0x0) 10:55:17 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009040600030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000007030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000021000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f00000000000000000000000400000000000b000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:17 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x700}, 0x0) 10:55:17 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000700030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100000000000000003f000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xa500, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000009030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000200000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:17 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0xa00}, 0x0) 10:55:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f00000000000000000000000400000000000f000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000300000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900000c030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:17 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009040700030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000023020020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000400000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:18 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0xa6e}, 0x0) 10:55:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000010030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xa600, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002020020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:18 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009040800030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000500000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:18 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0xe00}, 0x0) 10:55:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000022030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:18 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0xf00}, 0x0) 10:55:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000600000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002030020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000023030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:18 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000900030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000700000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xa700, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002040020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:19 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x1f00}, 0x0) 10:55:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900002c030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000900000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:19 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009040900030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002050020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000c00000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:19 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000a00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000048030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:19 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x2000}, 0x0) 10:55:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002060020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 723.182613] f2fs_msg: 274 callbacks suppressed [ 723.182629] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x8100000) [ 723.195149] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 723.202919] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 723.210203] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock [ 723.218040] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x8100000) [ 723.225675] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 723.233393] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 723.240949] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock 10:55:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xa800, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001001000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900004c030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000320000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:20 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009040a00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:20 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x3f00}, 0x0) 10:55:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001001200000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002800420000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 723.408933] F2FS-fs (loop5): Invalid log sectorsize (1275068425) [ 723.435308] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock 10:55:20 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x4800}, 0x0) 10:55:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900004e030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:20 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009040b00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000520000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xa900, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001001300000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:21 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x4c00}, 0x0) 10:55:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000620000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000060030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:21 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000c00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:21 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x6000}, 0x0) 10:55:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002001f20000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001002200000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:21 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009040c00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000068030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002002020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xaa00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001002300000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:21 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x6800}, 0x0) 10:55:21 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009002000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900006c030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002003f20000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001002c00000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:22 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x6c00}, 0x0) 10:55:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002004020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:22 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009002200030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000074030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001004800000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xab00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002048020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:22 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x6e0a}, 0x0) 10:55:22 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009002300030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001004c00000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900007a030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000060000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001006000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000070000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:22 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x7400}, 0x0) 10:55:22 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009da2600030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000005000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xac00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001006800000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000090000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:23 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x7a00}, 0x0) 10:55:23 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009ec2600030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000006000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:23 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0xf000}, 0x0) 10:55:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000007000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090000000a0000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001006c00000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:23 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009002c00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000220000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xad00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:24 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x30000}, 0x0) 10:55:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001007400000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090000000f0000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:24 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009003f00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000320000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000420000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001007a00000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:24 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x34000}, 0x0) 10:55:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000140000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:24 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009004000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000520000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xae00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100fe01000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:24 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009004800030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000320000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:24 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x400300}, 0x0) 10:55:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000620000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000003000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000030000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:25 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0xf0ffff}, 0x0) 10:55:25 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009024a00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090000003f0000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000403000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 728.392541] f2fs_msg: 303 callbacks suppressed [ 728.392557] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x8100000) [ 728.405269] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 728.413164] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 728.420665] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock [ 728.428580] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x8100000) [ 728.436657] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 728.444142] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 728.452580] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock 10:55:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xaf00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000060000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:25 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x1000000}, 0x0) 10:55:25 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009004c00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100fa03000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090000004e0000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000005000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000304000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 728.631566] F2FS-fs (loop5): Invalid log sectors per block(78) log sectorsize(9) [ 728.656250] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock 10:55:25 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x2000000}, 0x0) 10:55:25 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009006800030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000530000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000006000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xb000, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000404000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:26 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x3000000}, 0x0) 10:55:26 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009006c00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000007000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000003d00000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000008000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000504000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:26 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x4000000}, 0x0) 10:55:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900007fff0000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000030000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:26 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009007400030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xb100, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000604000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:27 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x5000000}, 0x0) 10:55:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020020020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000020000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:27 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009007a00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000704000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:27 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x6000000}, 0x0) 10:55:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020030020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000040000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:27 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009038900030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000804000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xb200, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:27 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x7000000}, 0x0) 10:55:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020040020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000904000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000070000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:27 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009019a00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020050020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:27 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x8000000}, 0x0) 10:55:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000a04000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000080000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:28 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000926da00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020060020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000b04000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:28 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0xa000000}, 0x0) 10:55:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000320000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000090000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:28 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000926ec00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xb300, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020800420000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000c04000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:28 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0xe000000}, 0x0) 10:55:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090000000a0000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:28 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000903fa00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000d04000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000520000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:29 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0xf000000}, 0x0) 10:55:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090000000f0000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000e04000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:29 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000901fe00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xb400, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000620000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:29 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x1f000000}, 0x0) 10:55:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000005000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:29 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090fff00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000100000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:29 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x20000000}, 0x0) 10:55:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000405000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020001f20000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000140000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:29 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000040000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000006000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xb500, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020002020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:30 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x3f000000}, 0x0) 10:55:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000320000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:30 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000070000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000406000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000007000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:30 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x48000000}, 0x0) 10:55:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020003f20000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090000004e0000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 733.426775] f2fs_msg: 288 callbacks suppressed [ 733.426791] F2FS-fs (loop4): Invalid log sectors per block(7) log sectorsize(9) [ 733.462688] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock 10:55:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000407000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:30 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x4c000000}, 0x0) [ 733.489489] F2FS-fs (loop4): Unable to read 2th superblock [ 733.525629] F2FS-fs (loop4): Invalid log sectors per block(7) log sectorsize(9) [ 733.582924] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 733.601038] F2FS-fs (loop5): Invalid log sectors per block(78) log sectorsize(9) [ 733.613290] F2FS-fs (loop4): Unable to read 2th superblock [ 733.648734] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 733.674040] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 733.698009] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock 10:55:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000408000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020004020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:31 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000100000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:31 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x60000000}, 0x0) 10:55:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xb600, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000530000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:31 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x68000000}, 0x0) 10:55:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000009000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020048020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:31 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000140000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000d00300000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:31 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x6c000000}, 0x0) 10:55:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000409000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000060000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:31 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000003d00000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090000000300000400000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xb700, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:32 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x6e0a0000}, 0x0) 10:55:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100040a000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000005000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:32 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900007fff0000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090000000300000009000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000006000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100040b000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:32 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x74000000}, 0x0) 10:55:32 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000200030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000007000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030200000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xb800, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100000c000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:32 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x7a000000}, 0x0) 10:55:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000220000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:32 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000300030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030300000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:32 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x9effffff}, 0x0) 10:55:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100040c000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000320000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:32 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000400030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030400000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000420000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xb900, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100040d000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:33 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0xf0ffffff}, 0x0) 10:55:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000520000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:33 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000500030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030500000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000620000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:33 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0xfffff000}, 0x0) 10:55:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100040e000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:33 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000600030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000030000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:33 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0xffffff7f}, 0x0) 10:55:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xba00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030600000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000012000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000060000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:34 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000700030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:34 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0xffffff9e}, 0x0) 10:55:34 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0xfffffff0}, 0x0) 10:55:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000005000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000013000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000006000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:34 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000900030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100001f000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xbb00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:34 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x3000000000000}, 0x0) 10:55:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030700000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000007000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:34 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000a00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000020000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000022000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000008000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030900000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:34 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x40030000000000}, 0x0) 10:55:34 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000c00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000023000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xbc00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000030000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:35 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0xf0ffffffffffff}, 0x0) 10:55:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030c00000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100b226000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:35 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009001000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100c626000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:35 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x100000000000000}, 0x0) [ 738.476565] f2fs_msg: 272 callbacks suppressed [ 738.476579] F2FS-fs (loop5): Invalid log sectors per block(3075) log sectorsize(9) [ 738.491467] F2FS-fs (loop4): Invalid log sectorsize (1048585) [ 738.501412] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock 10:55:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020020000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 738.524261] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 738.568709] F2FS-fs (loop4): Unable to read 2th superblock [ 738.574347] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 738.593915] F2FS-fs (loop4): Invalid log sectorsize (1048585) [ 738.609009] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock 10:55:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100002c000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020030000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 738.626079] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 738.651769] F2FS-fs (loop5): Invalid log sectors per block(3075) log sectorsize(9) 10:55:35 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x200000000000000}, 0x0) 10:55:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100003f000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:36 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009002200030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000031000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020040000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xbd00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:36 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x300000000000000}, 0x0) 10:55:36 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x400000000000000}, 0x0) 10:55:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020050000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000040000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:36 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009002300030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000032200000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:36 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x500000000000000}, 0x0) 10:55:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020060000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000048000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:36 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009002c00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:36 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x600000000000000}, 0x0) 10:55:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xbe00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000032300000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000300ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:37 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x700000000000000}, 0x0) 10:55:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100004c000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:37 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009004800030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000060000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020800400ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:37 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009004c00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000032c00000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:37 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x800000000000000}, 0x0) 10:55:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000500ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xbf00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000068000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:37 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0xa00000000000000}, 0x0) 10:55:37 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009006800030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000600ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000034800000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020001f00ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100006c000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:38 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0xe00000000000000}, 0x0) 10:55:38 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009006c00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020002000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000034c00000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xc000, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020003f00ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:38 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0xf00000000000000}, 0x0) 10:55:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000074000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:38 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009007400030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000034e00000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020004000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100007a000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:38 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x1f00000000000000}, 0x0) 10:55:38 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009007a00030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000001000000010026b2000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000036000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xc100, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020048000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:39 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x2000000000000000}, 0x0) 10:55:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000001000000010026c6000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000036800000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:39 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000401030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000200ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100c0ed000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:39 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009009a01030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:39 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x3f00000000000000}, 0x0) 10:55:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000300ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000001000000010003fa000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xc200, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000036c00000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:40 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900fe01030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:40 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x4800000000000000}, 0x0) 10:55:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000400ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000001000000010001fe000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000500ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000fff000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:40 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x4c00000000000000}, 0x0) 10:55:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000037400000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:40 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000402030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000600ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 743.645229] f2fs_msg: 272 callbacks suppressed [ 743.645245] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x8100000) [ 743.658176] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 743.665708] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 743.673141] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock [ 743.681762] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x8100000) [ 743.694997] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 743.702564] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 743.709775] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock 10:55:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xc300, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000020000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:40 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x6000000000000000}, 0x0) 10:55:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000003ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000037a00000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:40 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009004a02030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020008004ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000040000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 743.910131] F2FS-fs (loop4): Invalid log sectorsize (38404105) [ 743.913336] F2FS-fs (loop5): Invalid log sectors per block(31235) log sectorsize(9) 10:55:41 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x6800000000000000}, 0x0) 10:55:41 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000003030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030401000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000100000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xc400, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000005ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:41 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x6c00000000000000}, 0x0) 10:55:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100ffff1f0000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:41 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000403030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000039a01000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000400000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:41 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x6e0a000000000000}, 0x0) 10:55:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000006ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900000003fe01000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:41 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009008903030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001006b6b6b0000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:42 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x7400000000000000}, 0x0) 10:55:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f00000000000000000000000400000000000200002000002000001fddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000100000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030402000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xc500, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:42 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900fa03030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000020ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:42 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x7a00000000000000}, 0x0) 10:55:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000200000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:42 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000204030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030003000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f00000000000000000000000400000000000200002000002000003fddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000300000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:42 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x9effffff00000000}, 0x0) 10:55:42 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000304030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030403000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xc600, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000040300000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000040ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:43 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 10:55:43 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000404030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900000003f603000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000480ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000400000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:43 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000504030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:43 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) 10:55:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030204000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000002ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000040400000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:44 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0xfffffffffffff000}, 0x0) 10:55:44 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000604030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000003ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xc700, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030304000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:44 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) 10:55:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000500000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000004ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030404000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:44 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000704030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) [ 747.213205] nla_parse: 2 callbacks suppressed [ 747.213216] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000005ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000040500000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:44 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x2}, 0x0) 10:55:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030504000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000600000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 747.445144] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xc800, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000006ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:45 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000804030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:45 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x3}, 0x0) 10:55:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030604000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000040600000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 747.945063] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:45 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x0) 10:55:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000700000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 748.036509] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 10:55:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4795fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030704000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:45 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000904030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000040700000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 748.173188] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 748.651537] f2fs_msg: 274 callbacks suppressed [ 748.651553] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x8100000) [ 748.665546] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 748.674501] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 748.683047] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock [ 748.691663] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x8100000) 10:55:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xc900, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf46506ddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:45 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x5}, 0x0) 10:55:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000040800000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030804000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:45 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000a04030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) [ 748.701634] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 748.711347] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 748.720195] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock [ 748.779018] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:45 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x6}, 0x0) [ 748.820879] F2FS-fs (loop5): Invalid log sectors per block(264195) log sectorsize(9) [ 748.844522] F2FS-fs (loop4): Invalid log sectorsize (67764233) 10:55:46 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000b04030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4795f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030904000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:46 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x7}, 0x0) 10:55:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000900000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 748.951192] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 749.125597] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xca00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf465060100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030a04000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:46 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000c04030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:46 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x8}, 0x0) 10:55:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000040900000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 749.639629] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:46 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000005030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:46 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0xa}, 0x0) 10:55:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0200ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000040a00000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030b04000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0300ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 749.890264] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xcb00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:47 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0xe}, 0x0) 10:55:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000040b00000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:47 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000405030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0400ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030005000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 750.416791] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000c00000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:47 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0xf}, 0x0) 10:55:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0500ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000040c00000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:47 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x48}, 0x0) 10:55:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030405000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xcc00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:48 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000006030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0600ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000040d00000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:48 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x4c}, 0x0) 10:55:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030006000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000040e00000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0b00ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:48 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x60}, 0x0) 10:55:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030406000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:48 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000406030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0e00ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xcd00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000001200000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:49 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x68}, 0x0) 10:55:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0f00ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:49 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000007030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030007000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0003ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:49 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x6c}, 0x0) 10:55:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030407000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000001300000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:49 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x74}, 0x0) 10:55:49 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000407030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) [ 752.433287] nla_parse: 6 callbacks suppressed [ 752.433297] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xce00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f4106ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000001f00000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030408000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:49 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x7a}, 0x0) 10:55:49 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000408030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655feffdffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 752.857949] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000002000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:50 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0xf0}, 0x0) 10:55:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030009000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0102ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:50 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000009030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) [ 753.133898] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0103ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000002200000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:50 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x300}, 0x0) 10:55:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030409000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xcf00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:50 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000409030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0104ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 753.711324] f2fs_msg: 262 callbacks suppressed [ 753.711339] F2FS-fs (loop5): Invalid log sectors per block(590851) log sectorsize(9) [ 753.738705] F2FS-fs (loop4): Invalid log sectorsize (151257097) 10:55:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000002300000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 753.753720] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 753.773413] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 753.800635] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 753.807534] F2FS-fs (loop4): Unable to read 2th superblock 10:55:51 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x500}, 0x0) [ 753.837023] F2FS-fs (loop4): Invalid log sectorsize (151257097) [ 753.848515] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 753.868793] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 753.879794] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock 10:55:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0105ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 753.899557] F2FS-fs (loop5): Invalid log sectors per block(590851) log sectorsize(9) 10:55:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000002c00000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:51 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900000a030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) [ 753.997524] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900000003040a000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0106ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:51 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x600}, 0x0) 10:55:51 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900040a030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) [ 754.264716] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xd000, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000003f00000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900000003040b000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:51 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x700}, 0x0) 10:55:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100020053ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:51 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900040b030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) [ 754.593448] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f010002ff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000004000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:51 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0xa00}, 0x0) 10:55:51 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900000c030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900000003000c000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000004800000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 754.872778] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xd100, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ff0253ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:52 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0xa6e}, 0x0) 10:55:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000004c00000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:52 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900040c030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900000003fc0f000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000006000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900000003001f000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 755.487005] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef020001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:52 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000020030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:52 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0xe00}, 0x0) 10:55:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000006800000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 755.754674] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xd200, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef030001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030020000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:53 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0xf00}, 0x0) 10:55:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100006b6b6b00000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:53 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000022030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef040001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:53 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x1f00}, 0x0) 10:55:53 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000023030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000006c00000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030022000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef050001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xd300, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:54 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x2000}, 0x0) 10:55:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000007400000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef060001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030023000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:54 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900da26030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000007a00000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:54 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x3f00}, 0x0) 10:55:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef0b0001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900000003eb26000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:54 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900ec26030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100ffffff8c00000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xd400, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef0e0001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:54 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x4800}, 0x0) 10:55:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100000026b200000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900000003ed26000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:54 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900002c030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) [ 757.850263] nla_parse: 4 callbacks suppressed [ 757.850273] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef0f0001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000edc000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:55 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900003f030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900000003002c000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:55 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x4c00}, 0x0) 10:55:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef000301000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 758.124557] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xd500, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100000026c600000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:55 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x6000}, 0x0) 10:55:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef410601000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:55 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000040030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900000003003f000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53efeffd01000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 758.704792] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:55 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x6800}, 0x0) [ 758.792488] f2fs_msg: 265 callbacks suppressed [ 758.792502] F2FS-fs (loop5): Invalid log sectors per block(4128771) log sectorsize(9) [ 758.809858] F2FS-fs (loop4): Invalid log sectorsize (1073741833) 10:55:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100fffffff500000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 758.835252] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 758.855973] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 758.884392] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 758.899744] F2FS-fs (loop4): Unable to read 2th superblock [ 758.910783] F2FS-fs (loop4): Invalid log sectorsize (1073741833) [ 758.923088] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock 10:55:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010300000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:56 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x6c00}, 0x0) [ 758.926779] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock [ 758.934874] F2FS-fs (loop4): Unable to read 2th superblock [ 758.955139] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100fffffff600000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 759.083303] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xd600, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:56 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000048030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030040000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010400000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:56 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x6e0a}, 0x0) 10:55:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100000003fa00000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010201000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100000001fe00000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 759.541412] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:56 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x7400}, 0x0) 10:55:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100fffffffe00000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:56 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900024a030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030048000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 759.812526] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xd700, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010301000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000001000000010000000fff00000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:57 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x7a00}, 0x0) 10:55:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900000003004c000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:57 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900004c030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) [ 760.319786] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010401000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100001fffff00000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:57 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0xf000}, 0x0) 10:55:57 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000068030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900000003004e000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010501000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 760.570293] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xd800, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001007fffffff00000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:58 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x30000}, 0x0) 10:55:58 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900006c030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010601000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030060000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 761.159803] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010003000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001008cffffff00000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:58 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000074030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030068000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:58 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x34000}, 0x0) 10:55:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010005000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xd900, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100f5ffffff00000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900000003006c000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:58 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x400300}, 0x0) 10:55:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010006000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:58 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900007a030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef01000b000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100f6ffffff00000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:59 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0xf0ffff}, 0x0) 10:55:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef01000e000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:59 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000389030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030074000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xda00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:59 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) 10:55:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100feffffff00000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef01000f000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:55:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900000003007a000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:55:59 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900019a030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:55:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000080000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:55:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900000003f87f000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:56:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef01001f000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:00 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090026da030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:56:00 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) 10:56:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000002000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 763.077685] nla_parse: 5 callbacks suppressed [ 763.077695] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xdb00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010020000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900000003019a000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:56:00 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090026ec030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:56:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000003000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:00 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x3000000}, 0x0) [ 763.548863] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef01003f000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090000000326eb000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:56:00 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090003fa030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:56:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000004000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:00 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 10:56:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010040000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 763.867449] f2fs_msg: 230 callbacks suppressed [ 763.867464] F2FS-fs (loop5): Invalid log sectors per block(15410691) log sectorsize(9) [ 763.884213] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 763.898113] F2FS-fs (loop4): Invalid log sectorsize (4194500617) [ 763.922959] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 763.951729] F2FS-fs (loop4): Unable to read 2th superblock [ 763.971406] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 763.973442] F2FS-fs (loop4): Invalid log sectorsize (4194500617) [ 763.994496] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 764.014133] F2FS-fs (loop4): Unable to read 2th superblock [ 764.023358] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 764.043864] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock 10:56:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xdc00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000005000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:01 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x5000000}, 0x0) 10:56:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010641000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:01 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090001fe030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:56:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090000000326ed000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:56:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef01fdef000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 764.429067] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000006000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090000000303f6000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:56:01 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000fff030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:56:01 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x6000000}, 0x0) 10:56:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010002000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 764.760509] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xdd00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000007000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:02 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x7000000}, 0x0) 10:56:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000037ff8000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:56:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010003000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:02 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000040000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) [ 765.208945] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010004000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030ffc000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:56:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000009000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:02 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000002030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:56:02 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000000}, 0x0) 10:56:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010005000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 765.416407] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xde00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100000c000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090000000301fe000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:56:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010006000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:03 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0xa000000}, 0x0) 10:56:03 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000003030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:56:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef01000b000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:03 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0xe000000}, 0x0) [ 765.930413] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000010000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:03 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000004030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:56:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef01000e000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 766.072989] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030fff000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:56:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xdf00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000012000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:03 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0xf000000}, 0x0) 10:56:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef01000f000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000d000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:56:03 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000005030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:56:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000013000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 766.693712] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010000030000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:03 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x1f000000}, 0x0) 10:56:03 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000006030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:56:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090000000300000010000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:56:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000022000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xe000, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010041060000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000023000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:04 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 10:56:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090000000300000014000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:56:04 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000007030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:56:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100002c000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:04 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x3f000000}, 0x0) 10:56:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef0100effd0000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:04 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000009030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:56:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000001f000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:56:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000048000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xe100, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:05 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x48000000}, 0x0) 10:56:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef01001b781100ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090000000300000032000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:56:05 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900000a030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:56:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100004c000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000060000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 768.219764] nla_parse: 4 callbacks suppressed [ 768.219775] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef0100c0f97f08ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 768.321698] ================================================================================ [ 768.330735] UBSAN: Undefined behaviour in fs/f2fs/super.c:2227:16 [ 768.337125] shift exponent 50 is too large for 32-bit type 'int' [ 768.343399] CPU: 1 PID: 18147 Comm: syz-executor.5 Not tainted 4.19.150-syzkaller #0 [ 768.351307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 768.360877] Call Trace: [ 768.363528] dump_stack+0x22c/0x33e [ 768.367254] ubsan_epilogue+0xe/0x3a [ 768.371002] __ubsan_handle_shift_out_of_bounds.cold+0x1c4/0x250 [ 768.377489] ? __bread_gfp+0x81/0x300 [ 768.381602] f2fs_fill_super.cold+0x1f9/0x5fb [ 768.386148] ? vsnprintf+0x2cc/0x14f0 [ 768.390109] ? lock_downgrade+0x750/0x750 [ 768.394290] ? snprintf+0xbb/0xf0 [ 768.397769] ? f2fs_commit_super+0x400/0x400 [ 768.402219] ? __mutex_add_waiter+0x160/0x160 [ 768.406868] ? set_blocksize+0x163/0x3f0 [ 768.411059] mount_bdev+0x2fc/0x3b0 [ 768.414800] ? f2fs_commit_super+0x400/0x400 [ 768.419321] mount_fs+0xa3/0x318 [ 768.422731] vfs_kern_mount.part.0+0x68/0x470 [ 768.427258] do_mount+0x51c/0x2f10 [ 768.430921] ? check_preemption_disabled+0x41/0x2b0 [ 768.436140] ? copy_mount_string+0x40/0x40 [ 768.440417] ? kmem_cache_alloc_trace+0x379/0x4b0 [ 768.445291] ? _copy_from_user+0xd2/0x130 [ 768.449603] ? copy_mount_options+0x261/0x370 [ 768.454493] ksys_mount+0xcf/0x130 [ 768.458065] __x64_sys_mount+0xba/0x150 [ 768.462066] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 768.466774] do_syscall_64+0xf9/0x670 [ 768.470871] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 768.476082] RIP: 0033:0x4608aa [ 768.479298] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 768.498414] RSP: 002b:00007ff988b97a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 768.506406] RAX: ffffffffffffffda RBX: 00007ff988b97b20 RCX: 00000000004608aa [ 768.513960] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff988b97ae0 10:56:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000068000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:05 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x4c000000}, 0x0) [ 768.521249] RBP: 00007ff988b97ae0 R08: 00007ff988b97b20 R09: 0000000020000000 [ 768.528623] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 768.536100] R13: 0000000020000100 R14: 0000000020000140 R15: 0000000020000180 [ 768.543500] ================================================================================ 10:56:05 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900000c030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:56:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001030120ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 768.918959] f2fs_msg: 266 callbacks suppressed [ 768.918975] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x8100000) [ 768.935470] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 768.955328] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 768.964493] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock [ 768.990645] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x8100000) [ 769.011641] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 769.021044] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 769.028565] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock 10:56:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xe200, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100006c000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:06 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x60000000}, 0x0) 10:56:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef0100effdffffddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:06 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000022030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:56:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000003f000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) [ 769.143248] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000074000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef01001fffffffddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:06 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x68000000}, 0x0) [ 769.186696] F2FS-fs (loop4): Invalid log sectorsize (570425353) [ 769.206929] F2FS-fs (loop5): Invalid blocksize (2147483648), supports only 4KB [ 769.206929] 10:56:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001020000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000004e000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:56:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100007a000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 769.354421] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xe300, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:06 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000023030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:56:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001030000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:06 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x6c000000}, 0x0) 10:56:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000001000000010000fe010000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090000000300000053000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:56:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001040000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 769.923324] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000030000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:07 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x6e0a0000}, 0x0) 10:56:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090000000300000063000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:56:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001050000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:07 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900002c030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) [ 770.184631] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xe400, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000004030000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000037ffffffe000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:56:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001060000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:07 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x74000000}, 0x0) 10:56:07 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000048030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:56:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000300ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 770.699344] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000001000000010000fa030000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:07 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900004c030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:56:08 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x7a000000}, 0x0) 10:56:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030002000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:56:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001800400ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 770.973179] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xe500, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000003040000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000500ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:08 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000068030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:56:08 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 10:56:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030003000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:56:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000600ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 771.502316] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000004040000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:08 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) 10:56:08 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900006c030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:56:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030004000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:56:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001001f00ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 771.729923] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xe600, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000005040000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:09 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0xfffff000}, 0x0) 10:56:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030005000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:56:09 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000074030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:56:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001002000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001003f00ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 772.270118] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000006040000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:09 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 10:56:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030006000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:56:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001004000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:09 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900007a030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:56:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xe700, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000007040000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001048000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:10 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) 10:56:10 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000070000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:56:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030007000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:56:10 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) 10:56:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030009000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:56:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000200ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000008040000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 773.230917] nla_parse: 2 callbacks suppressed [ 773.230927] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:10 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000140000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:56:10 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0xffffffff}, 0x0) [ 773.483766] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xe800, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000009040000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900000003000c000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:56:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000300ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:11 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x2) 10:56:11 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000003d00000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) [ 773.974877] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 774.012694] f2fs_msg: 257 callbacks suppressed [ 774.012707] F2FS-fs (loop4): Invalid log sectorsize (50331657) 10:56:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000400ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100000a040000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 774.014405] F2FS-fs (loop5): Invalid log sectors per block(786435) log sectorsize(9) [ 774.042165] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 774.063521] F2FS-fs (loop4): Unable to read 2th superblock [ 774.087670] F2FS-fs (loop4): Invalid log sectorsize (50331657) [ 774.105744] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 774.128657] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock 10:56:11 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x3) [ 774.148816] F2FS-fs (loop4): Unable to read 2th superblock [ 774.170870] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) 10:56:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000500ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100000b040000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 774.209712] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock 10:56:11 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x4) [ 774.368858] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xe900, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:11 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900007fff0000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:56:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030010000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:56:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100000c040000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000600ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:11 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x5) 10:56:12 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000040000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:56:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000003ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100000d040000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:12 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x6) 10:56:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030022000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:56:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000010000000100000e040000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 775.078437] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xea00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001008004ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:12 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x7) 10:56:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000050000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:12 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000070000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:56:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030023000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:56:12 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x8) 10:56:12 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000100000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:56:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000005ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900000003002c000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:56:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000004050000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 775.875880] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000006ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:13 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000140000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:56:13 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0xa) 10:56:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000060000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef01000100001fddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xeb00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030048000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:56:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000004060000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 776.459597] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000020ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:13 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0xe) 10:56:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900000003004c000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:56:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef01000100003fddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:13 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000d00300000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:56:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000070000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 776.757517] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:13 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0xf) 10:56:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000040ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000004070000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xec00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900000003004e000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:56:14 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b00090000000300000008000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:56:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000480ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000004080000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:14 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x48) 10:56:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000090000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000002ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000004090000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:14 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030200000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) [ 777.467968] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030060000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:56:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000003ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0xed00, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:15 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x4c) 10:56:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000001000000010000040a0000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000004ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) 10:56:15 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030300000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:56:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030068000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:56:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000005ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[]) [ 778.151302] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000001000000010000040b0000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 10:56:15 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x60) 10:56:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b000900000003006c000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000180)) 10:56:15 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="1020f5f201000b0009000000030400000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000080)={[{@background_gc_off='background_gc=off'}]}) 10:56:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600102920f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000006ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000003c0)="0100000000180000ddf4655fddf4655fddf4655f000000138300010020f30200040000000000000000000000020000003000000002f1ff0004dd646bb0a439d3f592d9ae1ca75644c394a4cc6203560100e7695b9d743e55fa3653ba7fc0e3e9c6da840e92bf00b5c0ccffbfc4a3ac944fd03a97388c65e633ff131cacf76b541dac", 0x82, 0x1600}], 0x81, &(0x7f0000000140)=ANY=[])