25706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
eventfd(0xce24)

14:27:35 executing program 1:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)
ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, <r5=>r4, {r1, r2}}, './file0\x00'})
r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4)
sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000940)={&(0x7f0000000840), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x24, r6, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x404c0c0}, 0x8008041)
ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000a00)={0xa, &(0x7f0000000980)=[{0x5, 0x5, 0x1, 0x14000000}, {0x6, 0x7, 0x8, 0xd29}, {0x1, 0x3, 0x0, 0xf95}, {0x0, 0x40, 0x9, 0x100}, {0x4, 0x2, 0x1f, 0x7}, {0x8, 0x6, 0x6, 0x3}, {0x7, 0x7, 0x3a, 0xffffffe0}, {0x9, 0x9, 0x7, 0x5}, {0x100, 0x5, 0x3f, 0x49}, {0x0, 0x5, 0x2, 0x3b6}]})
sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x24, 0x0, 0x8, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x24}, 0x1, 0x0, 0x0, 0x7}, 0x20000000)
fanotify_mark(r0, 0x2, 0x48000000, r0, &(0x7f0000000b40)='./file0/file0\x00')

14:27:35 executing program 4:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)
ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, <r5=>r4, {r1, r2}}, './file0\x00'})
r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4)
sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000940)={&(0x7f0000000840), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x24, r6, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x404c0c0}, 0x8008041)
ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000a00)={0xa, &(0x7f0000000980)=[{0x5, 0x5, 0x1, 0x14000000}, {0x6, 0x7, 0x8, 0xd29}, {0x1, 0x3, 0x0, 0xf95}, {0x0, 0x40, 0x9, 0x100}, {0x4, 0x2, 0x1f, 0x7}, {0x8, 0x6, 0x6, 0x3}, {0x7, 0x7, 0x3a, 0xffffffe0}, {0x9, 0x9, 0x7, 0x5}, {0x100, 0x5, 0x3f, 0x49}, {0x0, 0x5, 0x2, 0x3b6}]})
sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x24, 0x0, 0x8, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x24}, 0x1, 0x0, 0x0, 0x7}, 0x20000000)
fanotify_mark(r0, 0x2, 0x48000000, r0, &(0x7f0000000b40)='./file0/file0\x00')

14:27:35 executing program 0:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)
ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, <r5=>r4, {r1, r2}}, './file0\x00'})
r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4)
sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000940)={&(0x7f0000000840), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x24, r6, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x404c0c0}, 0x8008041)
fanotify_mark(r0, 0x2, 0x48000000, r0, &(0x7f0000000b40)='./file0/file0\x00')

[   48.323451] befs: Unrecognized mount option "\" or missing value
[   48.330199] befs: (loop3): cannot parse mount options
[   48.332398] befs: Unrecognized mount option "\" or missing value
[   48.347986] befs: (loop5): cannot parse mount options
[   48.389864] print_req_error: I/O error, dev loop5, sector 0
14:27:35 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
eventfd(0xce24)

14:27:35 executing program 2:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)
ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, <r5=>r4, {r1, r2}}, './file0\x00'})
r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4)
sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000940)={&(0x7f0000000840), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x24, r6, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x404c0c0}, 0x8008041)
ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000a00)={0xa, &(0x7f0000000980)=[{0x5, 0x5, 0x1, 0x14000000}, {0x6, 0x7, 0x8, 0xd29}, {0x1, 0x3, 0x0, 0xf95}, {0x0, 0x40, 0x9, 0x100}, {0x4, 0x2, 0x1f, 0x7}, {0x8, 0x6, 0x6, 0x3}, {0x7, 0x7, 0x3a, 0xffffffe0}, {0x9, 0x9, 0x7, 0x5}, {0x100, 0x5, 0x3f, 0x49}, {0x0, 0x5, 0x2, 0x3b6}]})
sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x24, 0x0, 0x8, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x24}, 0x1, 0x0, 0x0, 0x7}, 0x20000000)
fanotify_mark(r0, 0x2, 0x48000000, r0, &(0x7f0000000b40)='./file0/file0\x00')

14:27:35 executing program 0:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)
ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, r4, {r1, r2}}, './file0\x00'})
syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4)
fanotify_mark(r0, 0x2, 0x48000000, r0, &(0x7f0000000b40)='./file0/file0\x00')

14:27:35 executing program 4:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)
ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, <r5=>r4, {r1, r2}}, './file0\x00'})
r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4)
sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000940)={&(0x7f0000000840), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x24, r6, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x404c0c0}, 0x8008041)
ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000a00)={0xa, &(0x7f0000000980)=[{0x5, 0x5, 0x1, 0x14000000}, {0x6, 0x7, 0x8, 0xd29}, {0x1, 0x3, 0x0, 0xf95}, {0x0, 0x40, 0x9, 0x100}, {0x4, 0x2, 0x1f, 0x7}, {0x8, 0x6, 0x6, 0x3}, {0x7, 0x7, 0x3a, 0xffffffe0}, {0x9, 0x9, 0x7, 0x5}, {0x100, 0x5, 0x3f, 0x49}, {0x0, 0x5, 0x2, 0x3b6}]})
sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x24, 0x0, 0x8, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x24}, 0x1, 0x0, 0x0, 0x7}, 0x20000000)

14:27:35 executing program 1:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)
ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, <r5=>r4, {r1, r2}}, './file0\x00'})
r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4)
sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000940)={&(0x7f0000000840), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x24, r6, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x404c0c0}, 0x8008041)
ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000a00)={0xa, &(0x7f0000000980)=[{0x5, 0x5, 0x1, 0x14000000}, {0x6, 0x7, 0x8, 0xd29}, {0x1, 0x3, 0x0, 0xf95}, {0x0, 0x40, 0x9, 0x100}, {0x4, 0x2, 0x1f, 0x7}, {0x8, 0x6, 0x6, 0x3}, {0x7, 0x7, 0x3a, 0xffffffe0}, {0x9, 0x9, 0x7, 0x5}, {0x100, 0x5, 0x3f, 0x49}, {0x0, 0x5, 0x2, 0x3b6}]})
sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x24, 0x0, 0x8, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x24}, 0x1, 0x0, 0x0, 0x7}, 0x20000000)

14:27:35 executing program 0:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)
ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, r4, {r1, r2}}, './file0\x00'})
fanotify_mark(r0, 0x2, 0x48000000, r0, &(0x7f0000000b40)='./file0/file0\x00')

[   48.456635] befs: Unrecognized mount option "\" or missing value
[   48.468449] befs: (loop3): cannot parse mount options
14:27:35 executing program 4:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)
ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, <r5=>r4, {r1, r2}}, './file0\x00'})
r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4)
sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000940)={&(0x7f0000000840), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x24, r6, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x404c0c0}, 0x8008041)
ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000a00)={0xa, &(0x7f0000000980)=[{0x5, 0x5, 0x1, 0x14000000}, {0x6, 0x7, 0x8, 0xd29}, {0x1, 0x3, 0x0, 0xf95}, {0x0, 0x40, 0x9, 0x100}, {0x4, 0x2, 0x1f, 0x7}, {0x8, 0x6, 0x6, 0x3}, {0x7, 0x7, 0x3a, 0xffffffe0}, {0x9, 0x9, 0x7, 0x5}, {0x100, 0x5, 0x3f, 0x49}, {0x0, 0x5, 0x2, 0x3b6}]})

14:27:35 executing program 1:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)
ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, <r5=>r4, {r1, r2}}, './file0\x00'})
r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4)
sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000940)={&(0x7f0000000840), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x24, r6, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x404c0c0}, 0x8008041)
ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000a00)={0xa, &(0x7f0000000980)=[{0x5, 0x5, 0x1, 0x14000000}, {0x6, 0x7, 0x8, 0xd29}, {0x1, 0x3, 0x0, 0xf95}, {0x0, 0x40, 0x9, 0x100}, {0x4, 0x2, 0x1f, 0x7}, {0x8, 0x6, 0x6, 0x3}, {0x7, 0x7, 0x3a, 0xffffffe0}, {0x9, 0x9, 0x7, 0x5}, {0x100, 0x5, 0x3f, 0x49}, {0x0, 0x5, 0x2, 0x3b6}]})

14:27:35 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
eventfd(0xce24)

14:27:35 executing program 2:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)
ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, <r5=>r4, {r1, r2}}, './file0\x00'})
r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4)
sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000940)={&(0x7f0000000840), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x24, r6, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x404c0c0}, 0x8008041)
ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000a00)={0xa, &(0x7f0000000980)=[{0x5, 0x5, 0x1, 0x14000000}, {0x6, 0x7, 0x8, 0xd29}, {0x1, 0x3, 0x0, 0xf95}, {0x0, 0x40, 0x9, 0x100}, {0x4, 0x2, 0x1f, 0x7}, {0x8, 0x6, 0x6, 0x3}, {0x7, 0x7, 0x3a, 0xffffffe0}, {0x9, 0x9, 0x7, 0x5}, {0x100, 0x5, 0x3f, 0x49}, {0x0, 0x5, 0x2, 0x3b6}]})
sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x24, 0x0, 0x8, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x24}, 0x1, 0x0, 0x0, 0x7}, 0x20000000)
fanotify_mark(r0, 0x2, 0x48000000, r0, &(0x7f0000000b40)='./file0/file0\x00')

14:27:35 executing program 0:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)
ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b})
fanotify_mark(r0, 0x2, 0x48000000, r0, &(0x7f0000000b40)='./file0/file0\x00')

14:27:35 executing program 4:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)
ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, <r5=>r4, {r1, r2}}, './file0\x00'})
r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4)
sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000940)={&(0x7f0000000840), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x24, r6, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x404c0c0}, 0x8008041)

[   48.599410] befs: Unrecognized mount option "\" or missing value
[   48.607000] befs: (loop5): cannot parse mount options
14:27:35 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:35 executing program 2:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)
ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, <r5=>r4, {r1, r2}}, './file0\x00'})
r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4)
sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000940)={&(0x7f0000000840), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x24, r6, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x404c0c0}, 0x8008041)
ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000a00)={0xa, &(0x7f0000000980)=[{0x5, 0x5, 0x1, 0x14000000}, {0x6, 0x7, 0x8, 0xd29}, {0x1, 0x3, 0x0, 0xf95}, {0x0, 0x40, 0x9, 0x100}, {0x4, 0x2, 0x1f, 0x7}, {0x8, 0x6, 0x6, 0x3}, {0x7, 0x7, 0x3a, 0xffffffe0}, {0x9, 0x9, 0x7, 0x5}, {0x100, 0x5, 0x3f, 0x49}, {0x0, 0x5, 0x2, 0x3b6}]})
sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x24, 0x0, 0x8, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x24}, 0x1, 0x0, 0x0, 0x7}, 0x20000000)

[   48.646071] befs: Unrecognized mount option "\" or missing value
[   48.653214] befs: (loop3): cannot parse mount options
[   48.680525] print_req_error: I/O error, dev loop5, sector 0
14:27:35 executing program 1:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)
ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, <r5=>r4, {r1, r2}}, './file0\x00'})
r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4)
sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000940)={&(0x7f0000000840), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x24, r6, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x404c0c0}, 0x8008041)

14:27:35 executing program 4:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)
ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, <r5=>r4, {r1, r2}}, './file0\x00'})
r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4)
sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000940)={&(0x7f0000000840), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x24, r6, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x404c0c0}, 0x8008041)

14:27:35 executing program 0:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)
fanotify_mark(r0, 0x2, 0x48000000, r0, &(0x7f0000000b40)='./file0/file0\x00')

14:27:35 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:35 executing program 0:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
fanotify_mark(r0, 0x2, 0x48000000, r0, &(0x7f0000000b40)='./file0/file0\x00')

14:27:35 executing program 1:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)
ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, r4, {r1, r2}}, './file0\x00'})
syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4)

14:27:35 executing program 2:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)
ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, <r5=>r4, {r1, r2}}, './file0\x00'})
r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4)
sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000940)={&(0x7f0000000840), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x24, r6, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x404c0c0}, 0x8008041)
ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000a00)={0xa, &(0x7f0000000980)=[{0x5, 0x5, 0x1, 0x14000000}, {0x6, 0x7, 0x8, 0xd29}, {0x1, 0x3, 0x0, 0xf95}, {0x0, 0x40, 0x9, 0x100}, {0x4, 0x2, 0x1f, 0x7}, {0x8, 0x6, 0x6, 0x3}, {0x7, 0x7, 0x3a, 0xffffffe0}, {0x9, 0x9, 0x7, 0x5}, {0x100, 0x5, 0x3f, 0x49}, {0x0, 0x5, 0x2, 0x3b6}]})

14:27:35 executing program 4:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)
ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, r4, {r1, r2}}, './file0\x00'})
syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4)

14:27:35 executing program 1:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)
ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, r4, {r1, r2}}, './file0\x00'})

14:27:35 executing program 2:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)
ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, <r5=>r4, {r1, r2}}, './file0\x00'})
r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4)
sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000940)={&(0x7f0000000840), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x24, r6, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x404c0c0}, 0x8008041)

[   48.871145] befs: Unrecognized mount option "\" or missing value
[   48.877312] befs: (loop5): cannot parse mount options
14:27:36 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:36 executing program 0:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
socket$nl_generic(0x10, 0x3, 0x10)
fanotify_mark(r0, 0x2, 0x48000000, r0, &(0x7f0000000b40)='./file0/file0\x00')

14:27:36 executing program 1:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)
ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b})

14:27:36 executing program 2:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)
ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, r4, {r1, r2}}, './file0\x00'})
syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4)

14:27:36 executing program 4:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)
ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, r4, {r1, r2}}, './file0\x00'})
syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4)

14:27:36 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:36 executing program 0:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
fanotify_mark(r0, 0x2, 0x48000000, r0, &(0x7f0000000b40)='./file0/file0\x00')

[   48.919750] print_req_error: I/O error, dev loop5, sector 0
14:27:36 executing program 1:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:36 executing program 2:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)
ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b})
syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4)

14:27:36 executing program 4:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)
ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, r4, {r1, r2}}, './file0\x00'})

14:27:36 executing program 1:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)

14:27:36 executing program 0:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
fanotify_mark(r0, 0x2, 0x48000000, r0, &(0x7f0000000b40)='./file0/file0\x00')

[   49.044908] befs: Unrecognized mount option "\" or missing value
[   49.053756] befs: (loop5): cannot parse mount options
14:27:36 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
eventfd(0x8)

14:27:36 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:36 executing program 2:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)
syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4)

14:27:36 executing program 1:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)

14:27:36 executing program 0:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
fanotify_mark(r0, 0x2, 0x48000000, r0, &(0x7f0000000b40)='./file0/file0\x00')

14:27:36 executing program 4:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)
ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, r4, {r1, r2}}, './file0\x00'})

14:27:36 executing program 0:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
fanotify_mark(r0, 0x2, 0x48000000, r0, &(0x7f0000000b40)='./file0/file0\x00')

14:27:36 executing program 4:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)
ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b})

14:27:36 executing program 1:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)

14:27:36 executing program 2:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4)

14:27:36 executing program 1:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)

14:27:36 executing program 2:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), r4)

14:27:36 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)

14:27:36 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
eventfd(0xce24)

14:27:36 executing program 1:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)

14:27:36 executing program 4:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)
ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000007c0)=@v2={0x2, @aes256, 0x0, '\x00', @b})

14:27:36 executing program 2:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), 0xffffffffffffffff)

14:27:36 executing program 0:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'})
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r1, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fanotify_mark(r0, 0x2, 0x48000000, r0, &(0x7f0000000b40)='./file0/file0\x00')

[   49.241519] befs: Unrecognized mount option "\" or missing value
[   49.247685] befs: (loop5): cannot parse mount options
14:27:36 executing program 1:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)

14:27:36 executing program 0:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'})
syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
fanotify_mark(r0, 0x2, 0x48000000, r0, &(0x7f0000000b40)='./file0/file0\x00')

14:27:36 executing program 2:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), 0xffffffffffffffff)

14:27:36 executing program 4:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:36 executing program 0:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'})
fanotify_mark(r0, 0x2, 0x48000000, r0, &(0x7f0000000b40)='./file0/file0\x00')

14:27:36 executing program 1:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)

14:27:36 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)

14:27:36 executing program 2:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), 0xffffffffffffffff)

14:27:36 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
eventfd(0xce24)

14:27:36 executing program 1:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'})
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r1, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r1, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)

14:27:36 executing program 4:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:36 executing program 0:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
fanotify_mark(0xffffffffffffffff, 0x2, 0x48000000, 0xffffffffffffffff, &(0x7f0000000b40)='./file0/file0\x00')

14:27:36 executing program 2:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), 0xffffffffffffffff)

[   49.413139] befs: Unrecognized mount option "\" or missing value
[   49.427345] befs: (loop5): cannot parse mount options
14:27:36 executing program 1:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'})
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)

14:27:36 executing program 4:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:36 executing program 0:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
fanotify_mark(0xffffffffffffffff, 0x2, 0x48000000, 0xffffffffffffffff, &(0x7f0000000b40)='./file0/file0\x00')

14:27:36 executing program 2:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), 0xffffffffffffffff)

14:27:36 executing program 1:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'})
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)

14:27:36 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)

14:27:36 executing program 2:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), 0xffffffffffffffff)

14:27:36 executing program 1:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)

14:27:36 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
eventfd(0xce24)

14:27:36 executing program 0:
fanotify_mark(0xffffffffffffffff, 0x2, 0x48000000, 0xffffffffffffffff, &(0x7f0000000b40)='./file0/file0\x00')

14:27:36 executing program 4:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:36 executing program 2:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'})
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r1, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), 0xffffffffffffffff)

14:27:36 executing program 0:
fanotify_mark(0xffffffffffffffff, 0x0, 0x48000000, 0xffffffffffffffff, &(0x7f0000000b40)='./file0/file0\x00')

[   49.592951] befs: Unrecognized mount option "\" or missing value
[   49.603899] befs: (loop5): cannot parse mount options
14:27:36 executing program 1:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)

14:27:36 executing program 4:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:36 executing program 2:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'})
syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), 0xffffffffffffffff)

14:27:36 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)

14:27:36 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)

14:27:36 executing program 4:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:36 executing program 0:
fanotify_mark(0xffffffffffffffff, 0x0, 0x48000000, 0xffffffffffffffff, &(0x7f0000000b40)='./file0/file0\x00')

14:27:36 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
eventfd(0x8)
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
eventfd(0xce24)

14:27:36 executing program 2:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'})
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), 0xffffffffffffffff)

14:27:36 executing program 1:
socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)

14:27:36 executing program 4:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
set_tid_address(&(0x7f0000000540))
sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:37 executing program 2:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
connect$l2tp(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), 0xffffffffffffffff)

14:27:37 executing program 1:
socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)

[   49.781592] befs: Unrecognized mount option "\" or missing value
[   49.787763] befs: (loop5): cannot parse mount options
14:27:37 executing program 0:
fanotify_mark(0xffffffffffffffff, 0x0, 0x48000000, 0xffffffffffffffff, &(0x7f0000000b40)='./file0/file0\x00')

14:27:37 executing program 2:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
connect$l2tp(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), 0xffffffffffffffff)

14:27:37 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)

14:27:37 executing program 0:
fanotify_mark(0xffffffffffffffff, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000b40)='./file0/file0\x00')

14:27:37 executing program 1:
socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)

14:27:37 executing program 4:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_getaddrlabel={0x7c, 0x4a, 0x10, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c044}, 0x4001)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:37 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
eventfd(0x8)
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
eventfd(0xce24)

14:27:37 executing program 0:
fanotify_mark(0xffffffffffffffff, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000b40)='./file0/file0\x00')

14:27:37 executing program 2:
connect$l2tp(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), 0xffffffffffffffff)

14:27:37 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, 0x0, 0x20000040)

14:27:37 executing program 4:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:37 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, 0x0, 0x20000040)

14:27:37 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
eventfd(0x8)
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
eventfd(0xce24)

14:27:37 executing program 0:
fanotify_mark(0xffffffffffffffff, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000b40)='./file0/file0\x00')

14:27:37 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)

14:27:37 executing program 2:
connect$l2tp(0xffffffffffffffff, 0x0, 0x0)
syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), 0xffffffffffffffff)

14:27:37 executing program 4:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
connect$l2tp(r0, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x1}, 0x10)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:37 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, 0x0, 0x20000040)

14:27:37 executing program 0:
fanotify_mark(0xffffffffffffffff, 0x2, 0x48000000, 0xffffffffffffffff, 0x0)

14:27:37 executing program 4:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:37 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
eventfd(0xce24)

14:27:37 executing program 2:
connect$l2tp(0xffffffffffffffff, 0x0, 0x0)
syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff)

14:27:37 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)

14:27:37 executing program 0:
connect$l2tp(0xffffffffffffffff, 0x0, 0x0)
syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), 0xffffffffffffffff)

14:27:37 executing program 4:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {<r1=>0x0, <r2=>0xffffffffffffffff}}, './file0\x00'})
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
fchownat(r0, &(0x7f0000000380)='./file0\x00', r1, r2, 0x800)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:37 executing program 4:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'})
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r1, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r1, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r1, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:37 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)

14:27:37 executing program 2:
connect$l2tp(0xffffffffffffffff, 0x0, 0x0)
syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff)

14:27:37 executing program 0:
connect$l2tp(0xffffffffffffffff, 0x0, 0x0)
syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), 0xffffffffffffffff)

14:27:37 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)

14:27:37 executing program 4:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'})
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r1, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r1, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r1, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:37 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
eventfd(0xce24)

14:27:37 executing program 2:
connect$l2tp(0xffffffffffffffff, 0x0, 0x0)
syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff)

14:27:37 executing program 4:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'})
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:37 executing program 0:
connect$l2tp(0xffffffffffffffff, 0x0, 0x0)
syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), 0xffffffffffffffff)

14:27:37 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)

14:27:37 executing program 2:
connect$l2tp(0xffffffffffffffff, 0x0, 0x0)
syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff)

14:27:37 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
eventfd(0xce24)

14:27:37 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)

14:27:37 executing program 2:
connect$l2tp(0xffffffffffffffff, 0x0, 0x0)
syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff)

14:27:37 executing program 4:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'})
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:37 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580), 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)

14:27:37 executing program 0:
syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), 0xffffffffffffffff)

14:27:37 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580), 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)

14:27:37 executing program 4:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'})
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:37 executing program 2:
connect$l2tp(0xffffffffffffffff, 0x0, 0x0)
syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff)

14:27:37 executing program 0:
syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff)

14:27:37 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580), 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)

14:27:37 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)

14:27:37 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
eventfd(0xce24)

14:27:37 executing program 4:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'})
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, 0x0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:37 executing program 2:
syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff)

14:27:37 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)

14:27:37 executing program 0:
syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff)

14:27:37 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)

14:27:37 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
eventfd(0xce24)

14:27:37 executing program 4:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'})
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, 0x0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:37 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)

14:27:37 executing program 0:
syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff)

14:27:37 executing program 4:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r0=>0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'})
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, 0x0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:37 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)

14:27:37 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
eventfd(0xce24)

14:27:37 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)

14:27:37 executing program 4:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:37 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={0x0}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)

14:27:37 executing program 4:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000005}, 0x51)
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:37 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
eventfd(0xce24)

14:27:37 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
eventfd(0xce24)

14:27:37 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)

14:27:37 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
eventfd(0xce24)

14:27:37 executing program 5:
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)

14:27:37 executing program 4:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:37 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
eventfd(0xce24)

[   50.673721] Zero length message leads to an empty skb
14:27:37 executing program 4:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:37 executing program 5:
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)

14:27:37 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={0x0}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)

14:27:37 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={0x0}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)

14:27:37 executing program 5:
openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)

14:27:38 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
eventfd(0xce24)

14:27:38 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
eventfd(0xce24)

14:27:38 executing program 4:
recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000000)=""/20, 0x14, 0x40002021, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10)
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:38 executing program 5:
openat$incfs(0xffffffffffffffff, 0x0, 0x1, 0x123)

14:27:38 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x0, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)

14:27:38 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
eventfd(0xce24)

14:27:38 executing program 5:
openat$incfs(0xffffffffffffffff, 0x0, 0x1, 0x123)

14:27:38 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)

[   50.810390] befs: Unrecognized mount option "\" or missing value
[   50.816570] befs: (loop0): cannot parse mount options
14:27:38 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:38 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)

14:27:38 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)

14:27:38 executing program 5:
openat$incfs(0xffffffffffffffff, 0x0, 0x1, 0x123)

14:27:38 executing program 5:
openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x0, 0x123)

14:27:38 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:38 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
eventfd(0xce24)

14:27:38 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:38 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
eventfd(0xce24)

14:27:38 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)

14:27:38 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:38 executing program 5:
openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x0, 0x0)

14:27:38 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)

14:27:38 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:38 executing program 5:
r0 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:38 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})

14:27:38 executing program 5:
r0 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:38 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:38 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:38 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x20000040)

14:27:38 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:38 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
eventfd(0xce24)

14:27:38 executing program 5:
r0 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:38 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)

14:27:38 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:38 executing program 5:
r0 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)

14:27:38 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})

14:27:38 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:38 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)

14:27:38 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
eventfd(0xce24)

14:27:38 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:38 executing program 5:
r0 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)

14:27:38 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)

14:27:38 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:38 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
eventfd(0xce24)

14:27:38 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})

[   51.310420] befs: Unrecognized mount option "\" or missing value
[   51.316809] befs: (loop0): cannot parse mount options
14:27:38 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:38 executing program 5:
r0 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)

14:27:38 executing program 1:
r0 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)

14:27:38 executing program 5:
syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff)

14:27:38 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:38 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:38 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:38 executing program 1:
r0 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)

14:27:38 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
eventfd(0x8)
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:38 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:38 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500))
r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
eventfd(0xce24)

14:27:38 executing program 5:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:38 executing program 1:
r0 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xbefa7d0f7c2e68c}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)

14:27:38 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:38 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
eventfd(0xce24)

14:27:38 executing program 5:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:38 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:38 executing program 5:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:38 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
eventfd(0xce24)

14:27:38 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, 0x0, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:38 executing program 5:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)

14:27:38 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500))
r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
eventfd(0xce24)

14:27:38 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
eventfd(0xce24)

14:27:38 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
eventfd(0x8)
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:38 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
eventfd(0x8)
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:38 executing program 5:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)

14:27:38 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, 0x0, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:38 executing program 5:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)

14:27:38 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, 0x0, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:38 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
eventfd(0xce24)

14:27:38 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
eventfd(0xce24)

14:27:38 executing program 5:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)

14:27:38 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:39 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:39 executing program 5:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)

14:27:39 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500))
r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
eventfd(0xce24)

14:27:39 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:39 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:39 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:39 executing program 5:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)

14:27:39 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
eventfd(0x8)
eventfd(0xce24)

14:27:39 executing program 5:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x77}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xe557}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0)

14:27:39 executing program 5:
syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)

14:27:39 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:39 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:39 executing program 5:
syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff)

14:27:39 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:39 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)
eventfd(0xce24)

14:27:39 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:39 executing program 5:
syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff)

14:27:39 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:39 executing program 5:
syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff)

14:27:39 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
eventfd(0x8)
eventfd(0xce24)

14:27:39 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:39 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:39 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:39 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)
eventfd(0xce24)

14:27:39 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:39 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:39 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:39 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x0, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:39 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:39 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)
eventfd(0xce24)

14:27:39 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:39 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
eventfd(0x8)
eventfd(0xce24)

14:27:39 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:39 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:39 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r1, &(0x7f0000000500))
r2 = openat$incfs(r1, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r3 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r3, 0x4})
ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
eventfd(0xce24)

14:27:39 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:39 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:39 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:39 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r1, &(0x7f0000000500))
r2 = openat$incfs(r1, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r3 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r3, 0x4})
ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
eventfd(0xce24)

[   52.250917] befs: Unrecognized mount option "\" or missing value
[   52.257099] befs: (loop0): cannot parse mount options
14:27:39 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x4c001}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:39 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x20000040)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:39 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:39 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r1, &(0x7f0000000500))
r2 = openat$incfs(r1, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r3 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r3, 0x4})
ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
eventfd(0xce24)

14:27:39 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:39 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:39 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:39 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r1, &(0x7f0000000500))
r2 = openat$incfs(r1, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r3 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r3, 0x4})
ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
eventfd(0xce24)

14:27:39 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:39 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
eventfd(0x8)
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:39 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)
sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:39 executing program 3:
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r0, &(0x7f0000000500))
r1 = openat$incfs(r0, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r2 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r2, 0x4})
ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
eventfd(0xce24)

14:27:39 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)
sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:39 executing program 3:
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r0, &(0x7f0000000500))
r1 = openat$incfs(r0, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r2 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r2, 0x4})
ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
eventfd(0xce24)

14:27:39 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)
sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:39 executing program 4:
syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)
sendmsg$L2TP_CMD_SESSION_GET(r0, 0x0, 0x0)

14:27:39 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:39 executing program 4:
syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)
sendmsg$L2TP_CMD_SESSION_GET(r0, 0x0, 0x0)

14:27:39 executing program 3:
r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r0, &(0x7f0000000500))
r1 = openat$incfs(r0, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r2 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r2, 0x4})
ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
eventfd(0xce24)

14:27:39 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:39 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:39 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
eventfd(0x8)
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:39 executing program 3:
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r0, &(0x7f0000000500))
r1 = openat$incfs(r0, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r2 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r2, 0x4})
ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
eventfd(0xce24)

14:27:39 executing program 4:
syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)
sendmsg$L2TP_CMD_SESSION_GET(r0, 0x0, 0x0)

14:27:39 executing program 3:
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r0, &(0x7f0000000500))
r1 = openat$incfs(r0, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r2 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r2, 0x4})
ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
eventfd(0xce24)

14:27:39 executing program 3:
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r0, &(0x7f0000000500))
r1 = openat$incfs(r0, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r2 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r2, 0x4})
ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
eventfd(0xce24)

14:27:39 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:39 executing program 3:
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r0, &(0x7f0000000500))
r1 = openat$incfs(r0, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r2 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r2, 0x4})
ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
eventfd(0xce24)

14:27:39 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:39 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:39 executing program 3:
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0)
timerfd_gettime(r0, &(0x7f0000000500))
r1 = openat$incfs(r0, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r2 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r2, 0x4})
ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
eventfd(0xce24)

14:27:39 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:39 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
eventfd(0x8)
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:39 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:39 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:39 executing program 3:
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0)
timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500))
r1 = openat$incfs(r0, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r2 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r2, 0x4})
ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
eventfd(0xce24)

14:27:40 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680), 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:40 executing program 3:
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0)
timerfd_gettime(0xffffffffffffffff, 0x0)
r1 = openat$incfs(r0, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r2 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r2, 0x4})
ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
eventfd(0xce24)

14:27:40 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680), 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:40 executing program 3:
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0)
timerfd_gettime(0xffffffffffffffff, 0x0)
r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r2 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r2, 0x4})
ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
eventfd(0xce24)

14:27:40 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:40 executing program 3:
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0)
timerfd_gettime(0xffffffffffffffff, 0x0)
r1 = openat$incfs(0xffffffffffffffff, 0x0, 0x1, 0x123)
r2 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r2, 0x4})
ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
eventfd(0xce24)

14:27:40 executing program 4:
r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)
sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000780)={&(0x7f0000000680), 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:40 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:40 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:40 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:40 executing program 3:
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0)
timerfd_gettime(0xffffffffffffffff, 0x0)
r1 = openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x123)
r2 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r2, 0x4})
ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
eventfd(0xce24)

14:27:40 executing program 3:
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0)
timerfd_gettime(0xffffffffffffffff, 0x0)
r1 = openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r2, 0x4})
ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
eventfd(0xce24)

[   52.922990] befs: Unrecognized mount option "\" or missing value
[   52.922997] befs: (loop0): cannot parse mount options
14:27:40 executing program 4:
syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)
sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:40 executing program 3:
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0)
timerfd_gettime(0xffffffffffffffff, 0x0)
r1 = openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = eventfd(0x0)
ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r2, 0x4})
ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
eventfd(0xce24)

14:27:40 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
eventfd(0x8)

14:27:40 executing program 4:
syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)
sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:40 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:40 executing program 3:
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0)
timerfd_gettime(0xffffffffffffffff, 0x0)
openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0)
r1 = eventfd(0x0)
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r1, 0x4})
ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
eventfd(0xce24)

14:27:40 executing program 4:
syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)
sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:40 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:40 executing program 3:
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0)
timerfd_gettime(0xffffffffffffffff, 0x0)
openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0)
eventfd(0x0)
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, 0x0)
ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
eventfd(0xce24)

14:27:40 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:40 executing program 4:
syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)
sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={0x0}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:40 executing program 3:
openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0)
timerfd_gettime(0xffffffffffffffff, 0x0)
openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0)
eventfd(0x0)
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, 0x0)
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
eventfd(0xce24)

14:27:40 executing program 4:
syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)
sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={0x0}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:40 executing program 3:
openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0)
timerfd_gettime(0xffffffffffffffff, 0x0)
openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0)
eventfd(0x0)
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, 0x0)
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
eventfd(0x0)

14:27:40 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
eventfd(0x8)

14:27:40 executing program 4:
syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)
sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={0x0}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:40 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:40 executing program 3:
syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)
sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={0x0}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:40 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:40 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:40 executing program 4:
syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)
sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:40 executing program 3:
syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)
sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={0x0}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:40 executing program 4:
syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)
sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, 0x0, 0x0, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:40 executing program 3:
syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)
sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={0x0}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:40 executing program 4:
syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)
sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, 0x0, 0x0, 0x0, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:40 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:40 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
eventfd(0x8)

14:27:40 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:40 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:40 executing program 4:
syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)
sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:40 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:40 executing program 4:
syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)
sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x5c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}]}, 0x5c}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:40 executing program 4:
syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)
sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x54, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}}]}, 0x54}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:40 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:40 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:40 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:40 executing program 4:
syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)
sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x40, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:40 executing program 4:
syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)
sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x34, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:40 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:40 executing program 4:
syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)
sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}]}, 0x2c}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:40 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:40 executing program 4:
syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)
sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:40 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:40 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:40 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:40 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:40 executing program 4:
syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)
sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:40 executing program 4:
syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)
sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x5}, 0x0)

14:27:40 executing program 4:
syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)
sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x14}, 0x14}}, 0x0)

14:27:40 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:40 executing program 4:
syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0)
sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x14}, 0x14}}, 0x0)

14:27:40 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:41 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:41 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:41 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:41 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:41 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})

14:27:41 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:41 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:41 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:41 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:41 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})

14:27:41 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:41 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:41 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:41 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:41 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:41 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})

14:27:41 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:41 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:41 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)

14:27:41 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:41 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:41 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)

14:27:41 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:41 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:41 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:41 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)

14:27:41 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:41 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)

14:27:42 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:42 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)

14:27:42 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:42 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:42 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:42 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)

14:27:42 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:42 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500))
r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)

14:27:42 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:42 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:42 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:42 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500))
r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)

14:27:42 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:42 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:42 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:42 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:42 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:42 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:42 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500))
r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)

14:27:42 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:42 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:42 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:42 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:42 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:42 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:42 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:42 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:42 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:42 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:42 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:42 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500))
r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})

14:27:43 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:43 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:43 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:43 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:43 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500))
r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})

14:27:43 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:43 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:43 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:43 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:43 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:43 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:43 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:43 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:43 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:43 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500))
r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})

14:27:43 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:43 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})

14:27:43 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:43 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

[   56.248384] befs: Unrecognized mount option "\" or missing value
[   56.269336] befs: (loop0): cannot parse mount options
14:27:43 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:43 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:43 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:43 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:43 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})

14:27:43 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:43 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})

14:27:43 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:43 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

[   56.405931] befs: Unrecognized mount option "\" or missing value
[   56.412702] befs: (loop0): cannot parse mount options
14:27:43 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:43 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

[   56.471266] print_req_error: I/O error, dev loop0, sector 0
14:27:43 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:43 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:43 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:43 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500))
r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:43 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:43 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:43 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:43 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500))
r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:43 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:43 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:43 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:43 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:43 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

[   56.685423] befs: Unrecognized mount option "\" or missing value
[   56.702065] befs: (loop0): cannot parse mount options
14:27:43 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:43 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500))
r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:43 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:44 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})

14:27:44 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:44 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})

14:27:44 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})

14:27:44 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:44 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:44 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:44 executing program 1:
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:44 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)

14:27:44 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:44 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:44 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:44 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:44 executing program 1:
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:44 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)

14:27:44 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:44 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:44 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:44 executing program 1:
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:44 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:44 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:44 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)

14:27:44 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:44 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:44 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:44 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:44 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:44 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:44 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:44 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:44 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:44 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:44 executing program 2:
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0)
r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:44 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:44 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:44 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:44 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:44 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:44 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:44 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:45 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:45 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:45 executing program 2:
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0)
r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:45 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:45 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:45 executing program 1:
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:45 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:45 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:45 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:45 executing program 2:
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0)
r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:45 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:45 executing program 1:
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:45 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:45 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:45 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:45 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:45 executing program 1:
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:45 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:45 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:45 executing program 5:
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0)
r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})

14:27:45 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:45 executing program 1:
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:45 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:45 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:45 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:45 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:45 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:45 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:45 executing program 5:
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0)
r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})

14:27:45 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:45 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:45 executing program 1:
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:45 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:45 executing program 5:
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0)
r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})

14:27:45 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:46 executing program 1:
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:46 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:46 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:46 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:46 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:46 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:46 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:46 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:46 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:46 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:46 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:46 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:46 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:46 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:46 executing program 4:
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0)
r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:46 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:46 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:46 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:46 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:46 executing program 4:
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0)
r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:46 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:46 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:46 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:46 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:46 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:46 executing program 4:
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0)
r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:46 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:46 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:46 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:46 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:46 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:46 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:46 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:46 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:46 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:46 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:46 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:46 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:46 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:46 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:46 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:46 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:46 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:46 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

[   59.755599] befs: Unrecognized mount option "\" or missing value
[   59.774085] befs: (loop0): cannot parse mount options
14:27:47 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:47 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:47 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:47 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:47 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:47 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:47 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:47 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:47 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:47 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:47 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:47 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:47 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:47 executing program 3:
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0)
r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:47 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:47 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:47 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:47 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:47 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:47 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:47 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:47 executing program 3:
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0)
r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:47 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:47 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:47 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, 0x0, 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:47 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:47 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:47 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, 0x0, 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:47 executing program 3:
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0)
r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:47 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:47 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:47 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:47 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, 0x0, 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:47 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:47 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:47 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:47 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x0, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:47 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:47 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:47 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:47 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:47 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x0, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:47 executing program 0:
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0)
r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:47 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:47 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:48 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:48 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:48 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:48 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x0, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:48 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:48 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:48 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:48 executing program 0:
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0)
r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:48 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:48 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:48 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:48 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:48 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:48 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:48 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:48 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:48 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:48 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, 0x0, 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:48 executing program 0:
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0)
r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:48 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:48 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:48 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:48 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:48 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:48 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, 0x0, 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:48 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:48 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:48 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:48 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})

14:27:48 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:48 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:48 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, 0x0, 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:48 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:48 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:48 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:48 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})

14:27:48 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:49 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:49 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x0, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:49 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:49 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r4 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r4, 0x4})

14:27:49 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:49 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:49 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, 0x0)
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:49 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:49 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:49 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x0, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:49 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, 0x0, 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:49 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, 0x0)
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:49 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:49 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:49 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x0, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:49 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:49 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, 0x0, 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:49 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:49 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, 0x0)
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:49 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:49 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x0)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:49 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
r3 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:49 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:49 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:49 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:49 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, 0x0, 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:49 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x0)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:49 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, 0x0, 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:49 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:49 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:49 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x0, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:49 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, 0x0, 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

[   62.669088] befs: Unrecognized mount option "\" or missing value
[   62.690135] befs: (loop0): cannot parse mount options
14:27:49 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x0)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:49 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:49 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:49 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(0xffffffffffffffff, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:50 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, 0x0, 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:50 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x0, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:50 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:50 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

[   62.842865] befs: Unrecognized mount option "\" or missing value
[   62.849971] befs: (loop0): cannot parse mount options
14:27:50 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:50 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x0, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:50 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:50 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:50 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, 0x0)
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:50 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:50 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x0, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:50 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x0, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:50 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:50 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, 0x0)
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:50 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:50 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x0, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:50 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:50 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:50 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, 0x0)
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:50 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:50 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:50 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, 0x0)
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:50 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:50 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:50 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:50 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:50 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:50 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, 0x0)
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:50 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:50 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:50 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:50 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:50 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, 0x0)
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:50 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:50 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:50 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:50 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r2, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

14:27:50 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:51 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, 0x0, 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:51 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x0, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:51 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:51 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, 0x0, 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:51 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:51 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, 0x0, 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:51 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:51 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x0, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

[   64.022694] befs: Unrecognized mount option "\" or missing value
[   64.034206] befs: (loop0): cannot parse mount options
14:27:51 executing program 0:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
eventfd(0xce24)

14:27:51 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:51 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, 0x0, 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:51 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, 0x0)
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

14:27:51 executing program 1:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, 0x0, 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:51 executing program 3:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, 0x0, 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x4000, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:51 executing program 5:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, 0x0)
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
r5 = eventfd(0x8)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, r5, 0x4})

14:27:51 executing program 2:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000080)={0x0, 0x0, 0x1, 0x975, 0x70})
ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2)
syz_mount_image$befs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xa228, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="8bc61e796e40568820ce8891201032eb7346579b848971f24f95a08e112ef6f58a5d5d65de4347183d5e9668299ef1c423b1b856497ab53d9e1e2b07f5dbb50975c1b1b4ab02e0a1eca3574b5d4d4b286789e1e68aac75fe76009b86a24a263d7439ea906657ce7edd765b2d25c666c064d8d575f123e4fffb", 0x79, 0xad35}, {&(0x7f00000001c0)="03835a830431c85189c5fcf7810535952197becd27c169c63664a4e24b2abd1019e7127afb13d3a8097a2e9fd5e808d638aa425de1dbf212305b37fe0ba551b3f2edefc3da149e1af8b68ca5d7f8c685616e528d8e551222062f35cbcf10c481d661dd230d7a0e4f1592ae97021983a5934a798291a1a0a90e3c26113f07c88be207837f679937da0ffd2c19a42c2eec6c64b8293028369def7dcf5992d8f09ca110aa9d1453011b5c3df1234991ddedb1a30b44a129d8825706574e7f1fd0ac639264167179", 0xc6, 0x2}, {&(0x7f00000002c0)="31729db72cfecd8ca7c0d6ead4f5e1a863590d2d4d02cd4c070959ddc03473732e6a1ab13ecdfb53425fbd5e8a5600c60cb399adcc9fef87204b064990001dde5174bd6e65d330593434b2491b6f8720213300b4ad847898cb96a8c30d86a8e0ff75c110f007c87f9b4ca86b5c65fd78dbd1aca9b17837d6e36a4f5d5f7b41621f147c1929afcafd845e44652ea7ad0e12471e48fc09a566e06c3803121a368441a033ad341dc45bc8b8ef35f851836e6484acd124d50a", 0xb7, 0x1000}], 0x4004, &(0x7f0000000400)={[{'\\'}, {'\x00'}, {'{'}, {}, {'\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '@}..)'}}]})
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000440)={@id={0x2, 0x0, @c}, 0x40, 0x0, '\x00', @b})
timerfd_gettime(r3, &(0x7f0000000500))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

14:27:51 executing program 4:
r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x234280, 0x10)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, 0x0)
timerfd_gettime(r3, &(0x7f0000000500))
r4 = openat$incfs(r3, &(0x7f0000000540)='.pending_reads\x00', 0x1, 0x123)
ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000005c0)={0xd000, &(0x7f0000000580), 0x1, 0xffffffffffffffff, 0x4})

[   64.287826] kasan: CONFIG_KASAN_INLINE enabled
[   64.292500] kasan: GPF could be caused by NULL-ptr deref or user memory access
[   64.302384] general protection fault: 0000 [#1] PREEMPT SMP KASAN
[   64.308614] Modules linked in:
[   64.311843] CPU: 0 PID: 10969 Comm: systemd-udevd Not tainted 4.14.288-syzkaller #0
[   64.319616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
[   64.328955] task: ffff88809ba7e000 task.stack: ffff88809f5b0000
[   64.335001] RIP: 0010:kobject_uevent_env+0xb2/0xf30
[   64.339995] RSP: 0018:ffff88809f5b7c00 EFLAGS: 00010206
[   64.345348] RAX: 0000000000000018 RBX: 0000000000000002 RCX: 1ffff1101374fd20
[   64.352601] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00000000000000c0
[   64.359854] RBP: ffff88808f484b90 R08: ffffffff8b9ba560 R09: 0000000000000003
[   64.367104] R10: 0000000000000000 R11: ffff88809ba7e000 R12: 00000000000000a0
[   64.374354] R13: dffffc0000000000 R14: ffff88808f484a88 R15: 00000000000000a0
[   64.381605] FS:  00007f1cdd1df8c0(0000) GS:ffff8880ba400000(0000) knlGS:0000000000000000
[   64.389807] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   64.395689] CR2: 00007f94bf0fe028 CR3: 000000009955b000 CR4: 00000000003406f0
[   64.402945] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   64.410241] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   64.417485] Call Trace:
[   64.420053]  ? lock_downgrade+0x740/0x740
[   64.424183]  loop_clr_fd+0x59f/0xc20
[   64.427882]  lo_release+0xff/0x190
[   64.431399]  ? loop_clr_fd+0xc20/0xc20
[   64.435260]  __blkdev_put+0x5aa/0x800
[   64.439041]  ? revalidate_disk+0x1f0/0x1f0
[   64.443252]  ? locks_remove_file+0x2cd/0x420
[   64.447636]  ? blkdev_put+0x75/0x4c0
[   64.451329]  ? blkdev_put+0x4c0/0x4c0
[   64.455106]  blkdev_close+0x86/0xb0
[   64.458733]  __fput+0x25f/0x7a0
[   64.461995]  task_work_run+0x11f/0x190
[   64.465877]  exit_to_usermode_loop+0x1ad/0x200
[   64.470561]  do_syscall_64+0x4a3/0x640
[   64.474426]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[   64.479590] RIP: 0033:0x7f1cdc325270
[   64.483276] RSP: 002b:00007ffd9282aa08 EFLAGS: 00000246 ORIG_RAX: 0000000000000003
[   64.490960] RAX: 0000000000000000 RBX: 0000000000000007 RCX: 00007f1cdc325270
[   64.498203] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007
[   64.505450] RBP: 00007f1cdd1df710 R08: 00005618f1495d90 R09: 00005618f1495b00
[   64.512801] R10: 00007f1cdd1df8c0 R11: 0000000000000246 R12: 0000000000000000
[   64.520048] R13: 00005618f1486900 R14: 0000000000000003 R15: 000000000000000e
[   64.527732] Code: 03 42 80 3c 28 00 0f 85 dd 0b 00 00 4d 8b 64 24 18 4d 85 e4 0f 84 fa 0b 00 00 e8 ea 56 57 fa 49 8d 7c 24 20 48 89 f8 48 c1 e8 03 <42> 80 3c 28 00 0f 85 d4 0b 00 00 49 8b 6c 24 20 48 85 ed 74 b0 
[   64.546890] RIP: kobject_uevent_env+0xb2/0xf30 RSP: ffff88809f5b7c00
[   64.554144] ---[ end trace 81f7805df468fdd7 ]---
[   64.559003] Kernel panic - not syncing: Fatal exception
[   64.564523] Kernel Offset: disabled
[   64.568136] Rebooting in 86400 seconds..