0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:53:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 529.343898][T22828] debugfs: File 'dropped' in directory 'loop0' already present! [ 529.368319][T22828] debugfs: File 'msg' in directory 'loop0' already present! 22:53:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000680)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) [ 529.394901][T22828] debugfs: File 'trace0' in directory 'loop0' already present! 22:53:56 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:53:56 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:53:56 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:53:56 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='io.bfq.weight\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000002c0), 0x12) [ 529.825141][T22843] debugfs: File 'dropped' in directory 'loop0' already present! [ 529.856577][T22843] debugfs: File 'msg' in directory 'loop0' already present! 22:53:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 529.880583][T22843] debugfs: File 'trace0' in directory 'loop0' already present! 22:53:57 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="abc1abec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000001380)=ANY=[@ANYPTR64, @ANYBLOB="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"], 0xe48) recvmmsg(r1, &(0x7f000000b4c0)=[{{0x0, 0x0, &(0x7f0000001340)=[{&(0x7f00000001c0)=""/218, 0x7ffff000}], 0x1}}], 0x1, 0x0, 0x0) 22:53:57 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x0, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:53:57 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:53:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:53:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="fe0d920481"], 0x3}}, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) accept4(0xffffffffffffffff, &(0x7f0000000580)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, &(0x7f0000000000)=0x80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x296, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:53:57 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070003000000030000100c00000009", 0x15, 0x1400}], 0x0, 0x0) 22:53:57 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x0, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:53:57 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:53:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000280)={0x0, 0x31, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) timer_delete(0x0) 22:53:58 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 530.989548][T22896] debugfs: File 'dropped' in directory 'loop0' already present! [ 531.017126][T22896] debugfs: File 'msg' in directory 'loop0' already present! [ 531.062296][T22896] debugfs: File 'trace0' in directory 'loop0' already present! 22:53:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x80800) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000140)={0x3, 0x0, [{0xa84, 0x0, 0x1}, {0x27f, 0x0, 0x9}, {0x368, 0x0, 0x625}]}) 22:53:58 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x7aa9}, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000440)={'vcan0\x00', 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x10000, 0x1000}, 0x0) setsockopt$XDP_UMEM_FILL_RING(r3, 0x11b, 0x5, &(0x7f0000000800)=0x8, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, &(0x7f0000000080)=0x80, 0x4) bind$xdp(r3, &(0x7f0000000300)={0x2c, 0x0, r2}, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, 0x0, 0x10, 0x70bd2b, 0x0, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x5}]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x40000) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}, 0xffffffff00000000}], 0x142, 0x44040) 22:53:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:53:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x0, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:53:58 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x7aa9}, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000440)={'vcan0\x00', 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x10000, 0x1000}, 0x0) setsockopt$XDP_UMEM_FILL_RING(r3, 0x11b, 0x5, &(0x7f0000000800)=0x8, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, &(0x7f0000000080)=0x80, 0x4) bind$xdp(r3, &(0x7f0000000300)={0x2c, 0x0, r2}, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, 0x0, 0x10, 0x70bd2b, 0x0, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x5}]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x40000) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}, 0xffffffff00000000}], 0x142, 0x44040) [ 531.603372][T22923] debugfs: File 'dropped' in directory 'loop0' already present! [ 531.633062][T22923] debugfs: File 'msg' in directory 'loop0' already present! 22:53:58 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) [ 531.686273][T22923] debugfs: File 'trace0' in directory 'loop0' already present! 22:53:58 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:53:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x0, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:53:59 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x7aa9}, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000440)={'vcan0\x00', 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x10000, 0x1000}, 0x0) setsockopt$XDP_UMEM_FILL_RING(r3, 0x11b, 0x5, &(0x7f0000000800)=0x8, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, &(0x7f0000000080)=0x80, 0x4) bind$xdp(r3, &(0x7f0000000300)={0x2c, 0x0, r2}, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, 0x0, 0x10, 0x70bd2b, 0x0, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x5}]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x40000) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}, 0xffffffff00000000}], 0x142, 0x44040) 22:53:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:53:59 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) [ 532.258869][T22950] debugfs: File 'dropped' in directory 'loop0' already present! 22:53:59 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000080)=ANY=[@ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRESHEX]]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x9, 0x101, 0x0, 0x0, 0x0, 0x95, 0x0, 0x0, 0xd1, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x7, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x4, 0x2}, 0x4080, 0x100000000, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:53:59 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 532.349854][T22950] debugfs: File 'msg' in directory 'loop0' already present! [ 532.365789][T22962] sg_write: data in/out 177333676/65167 bytes for SCSI command 0x0-- guessing data in; [ 532.365789][T22962] program syz-executor.3 not setting count and/or reply_len properly [ 532.427747][T22950] debugfs: File 'trace0' in directory 'loop0' already present! 22:53:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x0, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:53:59 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) 22:53:59 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) [ 532.737666][T22965] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 22:53:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 532.813164][T22965] CPU: 0 PID: 22965 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 532.822322][T22965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 532.832388][T22965] Call Trace: [ 532.835701][T22965] dump_stack+0x172/0x1f0 [ 532.840054][T22965] dump_header+0x177/0x1152 [ 532.844577][T22965] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 532.850401][T22965] ? ___ratelimit+0x2c8/0x595 [ 532.855099][T22965] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 532.860929][T22965] ? lockdep_hardirqs_on+0x418/0x5d0 [ 532.866234][T22965] ? trace_hardirqs_on+0x67/0x240 [ 532.871292][T22965] ? pagefault_out_of_memory+0x11c/0x11c [ 532.877386][T22965] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 532.880263][T22974] debugfs: File 'dropped' in directory 'loop0' already present! [ 532.883198][T22965] ? ___ratelimit+0x60/0x595 [ 532.883213][T22965] ? do_raw_spin_unlock+0x57/0x270 [ 532.883234][T22965] oom_kill_process.cold+0x10/0x15 [ 532.883252][T22965] out_of_memory+0x334/0x1340 [ 532.883276][T22965] ? lock_downgrade+0x920/0x920 [ 532.915212][T22965] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 532.921045][T22965] ? oom_killer_disable+0x280/0x280 [ 532.921551][T22974] debugfs: File 'msg' in directory 'loop0' already present! [ 532.926268][T22965] mem_cgroup_out_of_memory+0x1d8/0x240 [ 532.926285][T22965] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 532.926305][T22965] ? do_raw_spin_unlock+0x57/0x270 [ 532.926323][T22965] ? _raw_spin_unlock+0x2d/0x50 [ 532.926343][T22965] try_charge+0xf4b/0x1440 [ 532.926369][T22965] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 532.926392][T22965] ? percpu_ref_tryget_live+0x111/0x290 [ 532.950697][T22974] debugfs: File 'trace0' in directory 'loop0' already present! [ 532.954966][T22965] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 532.954987][T22965] ? __kasan_check_read+0x11/0x20 [ 532.955015][T22965] ? get_mem_cgroup_from_mm+0x156/0x320 [ 532.955033][T22965] mem_cgroup_try_charge+0x136/0x590 [ 532.964993][T22965] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 532.965019][T22965] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 532.965039][T22965] __handle_mm_fault+0x1e34/0x3f20 [ 532.989370][T22965] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 532.989401][T22965] ? __kasan_check_read+0x11/0x20 [ 532.989425][T22965] handle_mm_fault+0x1b5/0x6c0 [ 532.989448][T22965] __do_page_fault+0x536/0xdd0 [ 532.989473][T22965] do_page_fault+0x38/0x590 [ 532.989496][T22965] page_fault+0x39/0x40 [ 533.006573][T22965] RIP: 0033:0x4111bf [ 533.006589][T22965] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 533.006598][T22965] RSP: 002b:00007ffee1828fa0 EFLAGS: 00010206 [ 533.006610][T22965] RAX: 00007f357f40e000 RBX: 0000000000020000 RCX: 00000000004598ca [ 533.006619][T22965] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 533.006627][T22965] RBP: 00007ffee1829080 R08: ffffffffffffffff R09: 0000000000000000 [ 533.006635][T22965] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffee1829170 22:54:00 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) [ 533.006643][T22965] R13: 00007f357f42e700 R14: 0000000000000001 R15: 000000000075bfd4 [ 533.086315][T22965] memory: usage 307200kB, limit 307200kB, failcnt 194 [ 533.180617][T22965] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 533.188409][T22965] Memory cgroup stats for /syz5: [ 533.188529][T22965] anon 276324352 [ 533.188529][T22965] file 32768 [ 533.188529][T22965] kernel_stack 4653056 [ 533.188529][T22965] slab 13193216 [ 533.188529][T22965] sock 0 [ 533.188529][T22965] shmem 0 [ 533.188529][T22965] file_mapped 0 [ 533.188529][T22965] file_dirty 0 [ 533.188529][T22965] file_writeback 0 [ 533.188529][T22965] anon_thp 260046848 [ 533.188529][T22965] inactive_anon 0 22:54:00 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x0, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) [ 533.188529][T22965] active_anon 276254720 [ 533.188529][T22965] inactive_file 36864 [ 533.188529][T22965] active_file 102400 [ 533.188529][T22965] unevictable 0 [ 533.188529][T22965] slab_reclaimable 4866048 [ 533.188529][T22965] slab_unreclaimable 8327168 [ 533.188529][T22965] pgfault 48576 [ 533.188529][T22965] pgmajfault 0 [ 533.188529][T22965] workingset_refault 0 [ 533.188529][T22965] workingset_activate 0 [ 533.188529][T22965] workingset_nodereclaim 0 [ 533.188529][T22965] pgrefill 612 [ 533.188529][T22965] pgscan 538 [ 533.188529][T22965] pgsteal 160 22:54:00 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 533.339805][T22990] sg_write: data in/out 177333676/65167 bytes for SCSI command 0x0-- guessing data in; [ 533.339805][T22990] program syz-executor.3 not setting count and/or reply_len properly 22:54:00 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) [ 533.485562][T22965] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=17721,uid=0 [ 533.498444][T22994] debugfs: File 'dropped' in directory 'loop0' already present! [ 533.526631][T22994] debugfs: File 'msg' in directory 'loop0' already present! [ 533.546278][T22965] Memory cgroup out of memory: Killed process 17721 (syz-executor.5) total-vm:72708kB, anon-rss:2216kB, file-rss:35796kB, shmem-rss:0kB, UID:0 pgtables:147456kB oom_score_adj:1000 22:54:00 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 533.577972][T23003] sg_write: data in/out 177333676/65167 bytes for SCSI command 0x0-- guessing data in; [ 533.577972][T23003] program syz-executor.3 not setting count and/or reply_len properly [ 533.578870][T22994] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:00 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) [ 533.683347][T22970] syz-executor.5 invoked oom-killer: gfp_mask=0x400cc0(GFP_KERNEL_ACCOUNT), order=0, oom_score_adj=1000 [ 533.736331][T22970] CPU: 1 PID: 22970 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 533.745490][T22970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 533.755557][T22970] Call Trace: [ 533.758893][T22970] dump_stack+0x172/0x1f0 [ 533.763235][T22970] dump_header+0x177/0x1152 [ 533.767733][T22970] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 533.773523][T22970] ? ___ratelimit+0x2c8/0x595 [ 533.778199][T22970] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 533.783996][T22970] ? lockdep_hardirqs_on+0x418/0x5d0 [ 533.789269][T22970] ? trace_hardirqs_on+0x67/0x240 [ 533.794283][T22970] ? pagefault_out_of_memory+0x11c/0x11c [ 533.799908][T22970] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 533.805702][T22970] ? ___ratelimit+0x60/0x595 [ 533.810286][T22970] ? do_raw_spin_unlock+0x57/0x270 [ 533.815386][T22970] oom_kill_process.cold+0x10/0x15 [ 533.820498][T22970] out_of_memory+0x334/0x1340 [ 533.825169][T22970] ? lock_downgrade+0x920/0x920 [ 533.830009][T22970] ? oom_killer_disable+0x280/0x280 [ 533.835201][T22970] mem_cgroup_out_of_memory+0x1d8/0x240 [ 533.840736][T22970] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 533.846373][T22970] ? do_raw_spin_unlock+0x57/0x270 [ 533.851485][T22970] ? _raw_spin_unlock+0x2d/0x50 [ 533.856336][T22970] try_charge+0xa2d/0x1440 [ 533.860750][T22970] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 533.866290][T22970] ? find_held_lock+0x35/0x130 [ 533.871038][T22970] ? get_mem_cgroup_from_mm+0x139/0x320 [ 533.876574][T22970] ? lock_downgrade+0x920/0x920 [ 533.881413][T22970] ? percpu_ref_tryget_live+0x111/0x290 [ 533.886958][T22970] __memcg_kmem_charge_memcg+0x71/0xf0 [ 533.892409][T22970] ? memcg_kmem_put_cache+0x50/0x50 [ 533.897595][T22970] ? get_mem_cgroup_from_mm+0x156/0x320 [ 533.903130][T22970] __memcg_kmem_charge+0x13a/0x3a0 [ 533.908233][T22970] __alloc_pages_nodemask+0x4f7/0x900 [ 533.913610][T22970] ? __alloc_pages_slowpath+0x2540/0x2540 [ 533.919318][T22970] ? percpu_ref_put_many+0xb6/0x190 [ 533.924504][T22970] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 533.930733][T22970] alloc_pages_current+0x107/0x210 [ 533.935844][T22970] __get_free_pages+0xc/0x40 [ 533.940422][T22970] mmu_topup_memory_caches+0x1e1/0x490 [ 533.945878][T22970] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 533.952110][T22970] kvm_mmu_load+0x21/0x12f0 [ 533.956600][T22970] ? kvm_lapic_enable_pv_eoi+0x170/0x170 [ 533.962218][T22970] ? vcpu_enter_guest+0x28c5/0x6200 [ 533.967419][T22970] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 533.973646][T22970] vcpu_enter_guest+0x3e0a/0x6200 [ 533.978676][T22970] ? handle_emulation_failure+0x4e0/0x4e0 [ 533.984398][T22970] ? lock_acquire+0x190/0x410 [ 533.989071][T22970] ? kvm_arch_vcpu_ioctl_run+0x241/0x1750 [ 533.995582][T22970] kvm_arch_vcpu_ioctl_run+0x424/0x1750 [ 534.001111][T22970] ? kvm_arch_vcpu_ioctl_run+0x424/0x1750 [ 534.006832][T22970] kvm_vcpu_ioctl+0x4dc/0xf50 [ 534.011495][T22970] ? kvm_write_guest_cached+0x40/0x40 [ 534.016876][T22970] ? tomoyo_path_number_perm+0x263/0x520 [ 534.022507][T22970] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 534.028328][T22970] ? kvm_write_guest_cached+0x40/0x40 [ 534.033689][T22970] do_vfs_ioctl+0xdb6/0x13e0 [ 534.038276][T22970] ? ioctl_preallocate+0x210/0x210 [ 534.043372][T22970] ? __fget+0x384/0x560 [ 534.047524][T22970] ? ksys_dup3+0x3e0/0x3e0 [ 534.051934][T22970] ? nsecs_to_jiffies+0x30/0x30 [ 534.056774][T22970] ? tomoyo_file_ioctl+0x23/0x30 [ 534.061711][T22970] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 534.068025][T22970] ? security_file_ioctl+0x8d/0xc0 [ 534.073216][T22970] ksys_ioctl+0xab/0xd0 [ 534.077361][T22970] __x64_sys_ioctl+0x73/0xb0 [ 534.081939][T22970] do_syscall_64+0xfa/0x760 [ 534.086446][T22970] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 534.092337][T22970] RIP: 0033:0x459879 [ 534.096216][T22970] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 534.115804][T22970] RSP: 002b:00007f357f44ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 534.124475][T22970] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459879 [ 534.132435][T22970] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 534.140396][T22970] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 534.148354][T22970] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f357f44f6d4 [ 534.156318][T22970] R13: 00000000004c2c2f R14: 00000000004d62b0 R15: 00000000ffffffff [ 534.291523][T22970] memory: usage 307148kB, limit 307200kB, failcnt 197 [ 534.320690][T22970] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 534.361258][T22970] Memory cgroup stats for /syz5: [ 534.361497][T22970] anon 276324352 [ 534.361497][T22970] file 32768 [ 534.361497][T22970] kernel_stack 4653056 [ 534.361497][T22970] slab 13193216 [ 534.361497][T22970] sock 0 [ 534.361497][T22970] shmem 0 [ 534.361497][T22970] file_mapped 0 [ 534.361497][T22970] file_dirty 0 [ 534.361497][T22970] file_writeback 0 [ 534.361497][T22970] anon_thp 260046848 [ 534.361497][T22970] inactive_anon 0 [ 534.361497][T22970] active_anon 276254720 [ 534.361497][T22970] inactive_file 36864 [ 534.361497][T22970] active_file 102400 [ 534.361497][T22970] unevictable 0 [ 534.361497][T22970] slab_reclaimable 4866048 [ 534.361497][T22970] slab_unreclaimable 8327168 [ 534.361497][T22970] pgfault 48609 [ 534.361497][T22970] pgmajfault 0 [ 534.361497][T22970] workingset_refault 0 [ 534.361497][T22970] workingset_activate 0 [ 534.361497][T22970] workingset_nodereclaim 0 [ 534.361497][T22970] pgrefill 612 [ 534.361497][T22970] pgscan 538 [ 534.361497][T22970] pgsteal 160 [ 534.532399][T22970] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=21609,uid=0 [ 534.566648][T22970] Memory cgroup out of memory: Killed process 21609 (syz-executor.5) total-vm:72708kB, anon-rss:2216kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 22:54:01 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000080)=ANY=[@ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRESHEX]]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x9, 0x101, 0x0, 0x0, 0x0, 0x95, 0x0, 0x0, 0xd1, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x7, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x4, 0x2}, 0x4080, 0x100000000, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:54:01 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x0, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:01 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:01 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) 22:54:01 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:01 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, 0x0, 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:02 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:02 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000080)=ANY=[@ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRESHEX]]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x9, 0x101, 0x0, 0x0, 0x0, 0x95, 0x0, 0x0, 0xd1, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x7, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x4, 0x2}, 0x4080, 0x100000000, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:54:02 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x0, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:02 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) [ 535.334550][T23054] debugfs: File 'dropped' in directory 'loop0' already present! [ 535.410215][T23054] debugfs: File 'msg' in directory 'loop0' already present! 22:54:02 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000080)=ANY=[@ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRESHEX]]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x9, 0x101, 0x0, 0x0, 0x0, 0x95, 0x0, 0x0, 0xd1, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x7, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x4, 0x2}, 0x4080, 0x100000000, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:54:02 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) [ 535.519735][T23054] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:02 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:02 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, 0x0, 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:02 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x0, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:02 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) 22:54:03 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 535.987052][T23084] sg_write: data in/out 177333676/65167 bytes for SCSI command 0x0-- guessing data in; [ 535.987052][T23084] program syz-executor.3 not setting count and/or reply_len properly [ 536.050566][T23081] debugfs: File 'dropped' in directory 'loop0' already present! [ 536.082155][T23081] debugfs: File 'msg' in directory 'loop0' already present! 22:54:03 executing program 3: writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(0xffffffffffffffff, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) [ 536.154553][T23081] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:03 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e22, @rand_addr=0x6}}}, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000380)={0x10, 0x30, 0xfa00, {&(0x7f0000000280), 0x2, {0xa, 0x4e20, 0x3, @rand_addr="1d684e01c966313f940a5dd098fb702d", 0x9}}}, 0x38) bind$inet(r2, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r2, &(0x7f0000000100)={0x0, 0x302, &(0x7f0000000740)=[{&(0x7f0000001300)="fe", 0x1}], 0x1}, 0x0) ioctl$KDDELIO(r0, 0x4b35, 0x9) sendto$inet(r2, &(0x7f0000000900)="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", 0x480, 0x0, 0x0, 0xfffffff1) 22:54:03 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:03 executing program 3: writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(0xffffffffffffffff, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) [ 536.585207][T23102] debugfs: File 'dropped' in directory 'loop0' already present! 22:54:03 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e22, @rand_addr=0x6}}}, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000380)={0x10, 0x30, 0xfa00, {&(0x7f0000000280), 0x2, {0xa, 0x4e20, 0x3, @rand_addr="1d684e01c966313f940a5dd098fb702d", 0x9}}}, 0x38) bind$inet(r2, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r2, &(0x7f0000000100)={0x0, 0x302, &(0x7f0000000740)=[{&(0x7f0000001300)="fe", 0x1}], 0x1}, 0x0) ioctl$KDDELIO(r0, 0x4b35, 0x9) sendto$inet(r2, &(0x7f0000000900)="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", 0x480, 0x0, 0x0, 0xfffffff1) [ 536.666517][T23102] debugfs: File 'msg' in directory 'loop0' already present! 22:54:03 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, 0x0, 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) [ 536.748793][T23102] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:03 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:03 executing program 3: writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(0xffffffffffffffff, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) 22:54:04 executing program 3: r0 = syz_open_dev$sg(0x0, 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) 22:54:04 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:04 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e22, @rand_addr=0x6}}}, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000380)={0x10, 0x30, 0xfa00, {&(0x7f0000000280), 0x2, {0xa, 0x4e20, 0x3, @rand_addr="1d684e01c966313f940a5dd098fb702d", 0x9}}}, 0x38) bind$inet(r2, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r2, &(0x7f0000000100)={0x0, 0x302, &(0x7f0000000740)=[{&(0x7f0000001300)="fe", 0x1}], 0x1}, 0x0) ioctl$KDDELIO(r0, 0x4b35, 0x9) sendto$inet(r2, &(0x7f0000000900)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb8dfafc1d3f56bc543ab87321e12cca08a744a2d128b00634bc882151d36809229a96bc3437ef159489384ade077ba295eac2882dbfd3781dd4d4e609c42628dbb709b3eb1fa030009045dd98b9e6d77b6cec9ceb685595d43995e0f04c32260943add79831e661c6a351dedc8b9d220fbf9fb6e44fb6a629ce9a82025124fec9f3ee751f7da0cd7e799be88ddbdac20b48e890ff81d7fa28c2d017d7932f2569038740461accd4582f576e4fdb6150a3399f8266bc19eb943648ad1ad81420ed6c382436e474390c8995e829e4f9df43eed85a60b9ee254e31eb62900857fa134e76cc64880334adbff069a2e5e647d2ed36a96b23834b6f6ca6b8113baf4cf30347fbb7ffc30aea99872cc0dba03b07d3347b2d257edbe2733c26b7337a79962d8ce85469e3bcbe0e4a48a6ae69d13f2d4b5155b390ef67aa714b82b6313ee277cb8986eca5db2e97cb1ae2243bba80274f614ece521baef484394b4c161cb9ae926e21892578b49cfd6efe1cb1572148c10d92218ed73ec116a18de80ac42d2726a4523a764fc6dc356c5fbbf9d2c947ae3bc9a3dc76099f3257c8d5952876151b0326d8cb1d5683ee4ad5ded9a34c00ac1b03f34627ec18a7c2e92c87b7896549cfab5eb55fa85a970994bd4b22b5f0d045e241256d06f485a47b4a55ed389bc1734541232cd41908b5cfa4b8fcfcafce500a0c7ae99767713a98e7927aa69f6ccd7daea62f19ceb82559f41899c9a9aee99113e7e64b5f8b9824be9fdbfa4dd4995673d882bb4daeb64413b334e114965d2ba3cea8051e692508701b9400cb12eae457f8b8549944091b729160939918d8fcae611a5ded665f770db637487a236da1a58ba7566668651a77171fc4fe506496d19059343dbe4f426625d3f2b705f54581372361770bf5a9098a9fafefaf546426b294239ac33e3186e4d58ad2fa995a6ad4dc074e7cca11aead109563b2076c7c6e9f57ec63df960804e2e7f9d8444de9550cca3df7834d864e9777291c2e1f6205de2e43dc995ab8bb1515a365efc2830fa3e7a1dd137f550d6035212bc1f51c3b4ceea430df49ffc9210084ef156ad7e0d219efd6c116693735b44521d389969a3a65617cd2fd6e14060601cee4cd054cf36fe048b57d1d9ee3cad2a73552449926b4a69823823af35bc53e9d339be086e8b03fbe9c0ec68357e1fbe52eee7b67f5870c0aefb7ee8236747e0d67a26725fb515544cbbe8464da94cfd8c0b94bb4e51a263b1749bd0a7cf651931f806d1b928d1f9994f1ad4d50e6a5cd7a8e4e687f8564fdacc864013d095ba9d5709eced3c28eabda476d177a7836400a01e02beeb5a6636d4064fdda344967ad8682d14b87c71727cb66be27d1d39191f4223c545b62fb4860262ba8076a65dbc194cee1df846c584b7bbe9dce6e6895b2cbbb64b03b5554a4845cc3de2f939ef918421af9a5e9157e837651245299c03992d0ddee06bd22a31522aca0f309b1feccebc0b1c0ed9d21c19bfd15cd313ff64394fd6a10904890c9f6d646b026f27253e8f584c3ffd20ad67e8b", 0x480, 0x0, 0x0, 0xfffffff1) 22:54:04 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:04 executing program 3: r0 = syz_open_dev$sg(0x0, 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) [ 537.379931][T23136] debugfs: File 'dropped' in directory 'loop0' already present! 22:54:04 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x5, 0x0, 0x0, {}, {0x77359400}, {}, 0x2, @can={{}, 0x0, 0x0, 0x0, 0x0, "a84db492e2736dba"}}, 0x200001c8}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x6, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x2710}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "879323a8c7fdb9c0"}}, 0x48}}, 0x0) 22:54:04 executing program 3: r0 = syz_open_dev$sg(0x0, 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) 22:54:04 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 537.438195][T23136] debugfs: File 'msg' in directory 'loop0' already present! [ 537.477051][T23136] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:04 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:04 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:04 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) 22:54:04 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:05 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) 22:54:05 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f00000002c0)) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x2) accept4(r1, &(0x7f00000001c0)=@ax25={{0x3, @null}, [@null, @default, @null, @default, @default, @default, @remote, @rose]}, &(0x7f00000000c0)=0x80, 0x80000) socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) ioctl$FS_IOC_FSGETXATTR(r2, 0x80085504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) [ 538.109979][T23169] debugfs: File 'dropped' in directory 'loop0' already present! 22:54:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:05 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) [ 538.167369][T23169] debugfs: File 'msg' in directory 'loop0' already present! [ 538.231948][T23169] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001580), 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, 0x0, 0x0) sysinfo(0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$sndpcmc(0x0, 0x5708, 0x2) accept4(r0, &(0x7f00000001c0)=@ax25={{0x3, @null}, [@null, @default, @null, @default, @default, @default, @remote, @rose]}, &(0x7f00000000c0)=0x80, 0x80000) socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) ioctl$FS_IOC_FSGETXATTR(r1, 0x80085504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) 22:54:05 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:05 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) 22:54:05 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r3 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r3, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r4) r5 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r6) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:05 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) 22:54:05 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) [ 538.817811][T23203] debugfs: File 'dropped' in directory 'loop0' already present! [ 538.825525][T23203] debugfs: File 'msg' in directory 'loop0' already present! 22:54:06 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 538.917129][T23203] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:06 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) 22:54:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001580), 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000240)) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f00000002c0)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x5708, 0x2) accept4(0xffffffffffffffff, &(0x7f00000001c0)=@ax25={{0x3, @null}, [@null, @default, @null, @default, @default, @default, @remote, @rose]}, &(0x7f00000000c0)=0x80, 0x80000) socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) ioctl$FS_IOC_FSGETXATTR(r0, 0x80085504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) 22:54:06 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, 0x0, 0x0) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) 22:54:06 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r3 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r3, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r4) r5 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r6) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:06 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001580), 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, 0x0, 0x0) sysinfo(0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f00000002c0)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x5708, 0x2) accept4(r1, &(0x7f00000001c0)=@ax25={{0x3, @null}, [@null, @default, @null, @default, @default, @default, @remote, @rose]}, &(0x7f00000000c0)=0x80, 0x80000) socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) ioctl$FS_IOC_FSGETXATTR(r2, 0x80085504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) 22:54:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:06 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, 0x0, 0x0) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) [ 539.637445][T23232] debugfs: File 'dropped' in directory 'loop0' already present! 22:54:06 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:06 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, 0x0, 0x0) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) [ 539.696336][T23232] debugfs: File 'msg' in directory 'loop0' already present! [ 539.748137][T23232] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:06 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:06 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001580), 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, 0x0, 0x0) sysinfo(0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f00000002c0)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x5708, 0x2) accept4(r1, &(0x7f00000001c0)=@ax25={{0x3, @null}, [@null, @default, @null, @default, @default, @default, @remote, @rose]}, &(0x7f00000000c0)=0x80, 0x80000) socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) ioctl$FS_IOC_FSGETXATTR(r2, 0x80085504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) 22:54:07 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0), 0x0) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) 22:54:07 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r3 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r3, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r4) r5 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r6) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:07 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90021005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}], 0x1) [ 540.271293][T23267] debugfs: File 'dropped' in directory 'loop0' already present! 22:54:07 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0), 0x0) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) [ 540.315564][T23267] debugfs: File 'msg' in directory 'loop0' already present! [ 540.359420][T23267] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:07 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90021005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}], 0x1) 22:54:07 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0), 0x0) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) 22:54:07 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:07 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(0x0, &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:07 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{0x0}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) 22:54:08 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90021005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}], 0x1) 22:54:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 541.060299][T23295] debugfs: File 'dropped' in directory 'loop0' already present! [ 541.100290][T23295] debugfs: File 'msg' in directory 'loop0' already present! 22:54:08 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90021005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}], 0x1) 22:54:08 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{0x0}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) [ 541.148147][T23295] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:08 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:08 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{0x0}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) 22:54:08 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90021005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}], 0x1) 22:54:08 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(0x0, &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:08 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) 22:54:08 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:08 executing program 5: writev(0xffffffffffffffff, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90021005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}], 0x1) [ 541.797164][T23328] debugfs: File 'dropped' in directory 'loop0' already present! [ 541.836477][T23328] debugfs: File 'msg' in directory 'loop0' already present! 22:54:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 541.910607][T23328] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:09 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) 22:54:09 executing program 5: writev(0xffffffffffffffff, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90021005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}], 0x1) 22:54:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(0x0, &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:09 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:09 executing program 5: writev(0xffffffffffffffff, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90021005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}], 0x1) 22:54:09 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) [ 542.350446][T23358] debugfs: File 'dropped' in directory 'loop0' already present! [ 542.387393][T23358] debugfs: File 'msg' in directory 'loop0' already present! [ 542.429364][T23358] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:09 executing program 5: r0 = syz_open_dev$sg(0x0, 0x0, 0x5) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90021005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}], 0x1) 22:54:09 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873", 0x2c}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) 22:54:09 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', 0x0, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:09 executing program 5: r0 = syz_open_dev$sg(0x0, 0x0, 0x5) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90021005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}], 0x1) 22:54:09 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:10 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873", 0x2c}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) [ 543.006010][T23384] debugfs: File 'dropped' in directory 'loop0' already present! 22:54:10 executing program 5: r0 = syz_open_dev$sg(0x0, 0x0, 0x5) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90021005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}], 0x1) [ 543.054344][T23384] debugfs: File 'msg' in directory 'loop0' already present! [ 543.098864][T23384] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:10 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873", 0x2c}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) 22:54:10 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x0) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90021005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}], 0x1) 22:54:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', 0x0, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:10 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb74", 0x42}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) 22:54:10 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[], 0x0) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:10 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb74", 0x42}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) 22:54:10 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 543.737791][T23418] debugfs: File 'dropped' in directory 'loop0' already present! 22:54:10 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x0) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90021005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}], 0x1) [ 543.786780][T23418] debugfs: File 'msg' in directory 'loop0' already present! 22:54:10 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb74", 0x42}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) [ 543.839641][T23418] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:11 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x0) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90021005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}], 0x1) 22:54:11 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', 0x0, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:11 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e4", 0x4d}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) 22:54:11 executing program 5: syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(0xffffffffffffffff, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90021005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}], 0x1) 22:54:11 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:11 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e4", 0x4d}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) [ 544.369900][T23447] debugfs: File 'dropped' in directory 'loop0' already present! [ 544.488008][T23447] debugfs: File 'msg' in directory 'loop0' already present! [ 544.547595][T23447] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:11 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[], 0x0) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:11 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e4", 0x4d}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) 22:54:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:11 executing program 5: syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(0xffffffffffffffff, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90021005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}], 0x1) 22:54:11 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, 0x0, 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:11 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb9101", 0x53}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) 22:54:12 executing program 5: syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(0xffffffffffffffff, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90021005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}], 0x1) 22:54:12 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 545.057513][T23481] debugfs: File 'dropped' in directory 'loop0' already present! 22:54:12 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb9101", 0x53}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) [ 545.100670][T23481] debugfs: File 'msg' in directory 'loop0' already present! 22:54:12 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, 0x0, 0x0) [ 545.176433][T23481] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:12 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb9101", 0x53}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) 22:54:12 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, 0x0, 0x0) 22:54:12 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[], 0x0) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:12 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, 0x0, 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:12 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:12 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2a", 0x56}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) 22:54:12 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, 0x0, 0x0) 22:54:12 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:12 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2a", 0x56}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) [ 545.866511][T23513] debugfs: File 'dropped' in directory 'loop0' already present! [ 545.906842][T23513] debugfs: File 'msg' in directory 'loop0' already present! 22:54:13 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000012c0), 0x0) [ 545.962871][T23513] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:13 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2a", 0x56}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) 22:54:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:13 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000012c0), 0x0) 22:54:13 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, 0x0, 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) [ 546.491383][T23549] debugfs: File 'dropped' in directory 'loop0' already present! [ 546.535372][T23549] debugfs: File 'msg' in directory 'loop0' already present! [ 546.573194][T23549] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:13 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:13 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae4", 0x57}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) 22:54:13 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000012c0), 0x0) 22:54:13 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:13 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae4", 0x57}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) 22:54:13 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000012c0)=[{0x0}], 0x1) 22:54:13 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(0x0, &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:14 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:14 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae4", 0x57}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) 22:54:14 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000012c0)=[{0x0}], 0x1) [ 547.151496][T23576] debugfs: File 'dropped' in directory 'loop0' already present! [ 547.181496][T23576] debugfs: File 'msg' in directory 'loop0' already present! 22:54:14 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(0xffffffffffffffff, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) 22:54:14 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000012c0)=[{0x0}], 0x1) [ 547.260728][T23576] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:14 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:14 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:14 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:14 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(0xffffffffffffffff, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) 22:54:14 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000012c0)=[{}], 0x1) 22:54:14 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(0x0, &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:14 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000012c0)=[{}], 0x1) 22:54:14 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(0xffffffffffffffff, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0xfeb9}], 0x2) [ 547.933406][T23612] debugfs: File 'dropped' in directory 'loop0' already present! [ 547.980134][T23612] debugfs: File 'msg' in directory 'loop0' already present! 22:54:15 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000012c0)=[{}], 0x1) 22:54:15 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, 0x0, 0x0) [ 548.022667][T23612] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:15 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:15 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, 0x0, 0x0) 22:54:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:15 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90021005a90f57f07703aeff0f64ebbee07962c2277", 0x1a}], 0x1) 22:54:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(0x0, &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:15 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, 0x0, 0x0) 22:54:15 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}], 0x1) 22:54:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:15 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90021005a90f57f07703aeff0f64ebbee07962c2277", 0x1a}], 0x1) [ 548.763940][T23651] debugfs: File 'dropped' in directory 'loop0' already present! [ 548.823919][T23651] debugfs: File 'msg' in directory 'loop0' already present! [ 548.891702][T23651] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:16 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90021005a90f57f07703aeff0f64ebbee07962c2277", 0x1a}], 0x1) 22:54:16 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}], 0x1) 22:54:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:16 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a36710497"], 0x25) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:16 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90021005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb", 0x27}], 0x1) 22:54:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:16 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}], 0x1) 22:54:16 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90021005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb", 0x27}], 0x1) 22:54:16 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {0x0}], 0x2) 22:54:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:16 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90021005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb", 0x27}], 0x1) 22:54:17 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {0x0}], 0x2) 22:54:17 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90021005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2a", 0x2e}], 0x1) 22:54:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 550.043759][T23705] debugfs: File 'dropped' in directory 'loop0' already present! [ 550.057334][T23705] debugfs: File 'msg' in directory 'loop0' already present! [ 550.109227][T23705] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:17 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a36710497"], 0x25) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:17 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {0x0}], 0x2) 22:54:17 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90021005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2a", 0x2e}], 0x1) 22:54:17 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)}], 0x2) 22:54:17 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:17 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:17 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90021005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2a", 0x2e}], 0x1) 22:54:17 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)}], 0x2) [ 550.710076][T23736] debugfs: File 'dropped' in directory 'loop0' already present! [ 550.776527][T23736] debugfs: File 'msg' in directory 'loop0' already present! 22:54:18 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90021005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c", 0x31}], 0x1) [ 550.873097][T23736] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:18 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)}], 0x2) 22:54:18 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:18 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a36710497"], 0x25) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:18 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:18 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90021005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c", 0x31}], 0x1) 22:54:18 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56", 0x12}], 0x2) 22:54:18 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 551.368261][T23764] debugfs: File 'dropped' in directory 'loop0' already present! 22:54:18 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56", 0x12}], 0x2) [ 551.416884][T23764] debugfs: File 'msg' in directory 'loop0' already present! 22:54:18 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90021005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c", 0x31}], 0x1) [ 551.520028][T23764] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:18 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90021005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b4", 0x33}], 0x1) 22:54:18 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:18 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56", 0x12}], 0x2) 22:54:18 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:19 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90021005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b4", 0x33}], 0x1) 22:54:19 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d"], 0x38) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:19 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:19 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162a", 0x1b}], 0x2) [ 552.151151][T23797] debugfs: File 'dropped' in directory 'loop0' already present! [ 552.166274][T23797] debugfs: File 'msg' in directory 'loop0' already present! 22:54:19 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90021005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b4", 0x33}], 0x1) [ 552.252492][T23797] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:19 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162a", 0x1b}], 0x2) 22:54:19 executing program 5: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x3d3427e) clone(0x1100100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, 0x0) 22:54:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:19 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162a", 0x1b}], 0x2) 22:54:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 552.773083][T23825] debugfs: File 'dropped' in directory 'loop0' already present! [ 552.822793][T23825] debugfs: File 'msg' in directory 'loop0' already present! 22:54:20 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e02", 0x20}], 0x2) 22:54:20 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_S390_VCPU_FAULT(0xffffffffffffffff, 0x4004ae52, &(0x7f0000000000)=0x9) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f0000000300)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x100a0}) [ 552.914963][T23825] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:20 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d"], 0x38) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:20 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:20 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e02", 0x20}], 0x2) 22:54:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0), 0x0, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:20 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 553.503829][T23859] debugfs: File 'dropped' in directory 'loop0' already present! 22:54:20 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e02", 0x20}], 0x2) [ 553.592780][T23859] debugfs: File 'msg' in directory 'loop0' already present! 22:54:20 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigprocmask(0x0, &(0x7f00000001c0)={0x7fffffff}, 0x0, 0x8) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 22:54:20 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 553.656908][T23859] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:20 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d"], 0x38) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:20 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27", 0x22}], 0x2) 22:54:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0), 0x0, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, 0x0, 0x0) semctl$GETZCNT(0x0, 0x7, 0xf, 0x0) sysinfo(&(0x7f0000000000)=""/22) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f00000002c0)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x5708, 0x2) accept4(r0, 0x0, &(0x7f00000000c0), 0x80000) socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x7, 0x12, &(0x7f0000000100)=""/34) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) ioctl$FS_IOC_FSGETXATTR(r1, 0x80085504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) 22:54:21 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:21 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27", 0x22}], 0x2) [ 554.269216][T23903] usb usb5: usbfs: process 23903 (syz-executor.5) did not claim interface 0 before use 22:54:21 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27", 0x22}], 0x2) 22:54:21 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001580), 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14) ioctl$TUNSETIFINDEX(r0, 0x400454da, 0x0) accept4(0xffffffffffffffff, &(0x7f00000001c0)=@ax25={{0x3, @null}, [@null, @default, @null, @default, @default, @default, @remote, @rose]}, 0x0, 0x80000) socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) ioctl$FS_IOC_FSGETXATTR(r1, 0x80085504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) 22:54:21 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0), 0x0, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:21 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b2", 0x23}], 0x2) [ 554.773300][T23914] debugfs: File 'dropped' in directory 'loop0' already present! 22:54:21 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b2", 0x23}], 0x2) [ 554.814070][T23914] debugfs: File 'msg' in directory 'loop0' already present! 22:54:21 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40"], 0x41) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:22 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 554.860407][T23914] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:22 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) ioctl$FS_IOC_FSGETXATTR(r0, 0x8004550f, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) 22:54:22 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b2", 0x23}], 0x2) 22:54:22 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{0x0}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:22 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:22 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) ioctl$FS_IOC_FSGETXATTR(r0, 0x8004550f, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) 22:54:22 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0x24}], 0x1) [ 555.404365][T23946] debugfs: File 'dropped' in directory 'loop0' already present! [ 555.425585][T23946] debugfs: File 'msg' in directory 'loop0' already present! [ 555.468883][T23946] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:22 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) ioctl$FS_IOC_FSGETXATTR(r0, 0x8004550f, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) 22:54:22 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0x24}], 0x1) 22:54:22 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:22 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) ioctl$FS_IOC_FSGETXATTR(r0, 0x8004550f, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) 22:54:23 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40"], 0x41) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:23 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{0x0}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:23 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0x24}], 0x1) 22:54:23 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:23 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{0x0}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0x24}], 0x2) 22:54:23 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) [ 556.114521][T23978] debugfs: File 'dropped' in directory 'loop0' already present! [ 556.148685][T23978] debugfs: File 'msg' in directory 'loop0' already present! [ 556.202246][T23978] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:23 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{0x0}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0x24}], 0x2) 22:54:23 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:23 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) 22:54:23 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{0x0}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:23 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{0x0}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0x24}], 0x2) 22:54:23 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) 22:54:24 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40"], 0x41) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:24 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:24 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0x24}], 0x2) 22:54:24 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) ioctl$FS_IOC_FSGETXATTR(r0, 0x8004550f, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) 22:54:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:24 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0x24}], 0x2) 22:54:24 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:24 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) ioctl$FS_IOC_FSGETXATTR(r0, 0x8004550f, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) 22:54:24 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0x24}], 0x2) 22:54:24 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:24 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c2277", 0x1a}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0x24}], 0x2) 22:54:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) [ 557.873612][T24059] debugfs: File 'dropped' in directory 'loop0' already present! 22:54:25 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc"], 0x46) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:25 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) ioctl$FS_IOC_FSGETXATTR(r0, 0x8004550f, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) 22:54:25 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:25 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c2277", 0x1a}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0x24}], 0x2) [ 557.978660][T24059] debugfs: File 'msg' in directory 'loop0' already present! [ 557.999770][T24059] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:25 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) ioctl$FS_IOC_FSGETXATTR(r0, 0x8004550f, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) 22:54:25 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c2277", 0x1a}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0x24}], 0x2) 22:54:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:25 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:25 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb", 0x27}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0x24}], 0x2) 22:54:25 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) ioctl$FS_IOC_FSGETXATTR(r0, 0x8004550f, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) [ 558.483549][T24085] debugfs: File 'dropped' in directory 'loop0' already present! [ 558.525455][T24085] debugfs: File 'msg' in directory 'loop0' already present! 22:54:25 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:25 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb", 0x27}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0x24}], 0x2) [ 558.617951][T24085] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:26 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc"], 0x46) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:26 executing program 5: r0 = syz_open_dev$usb(0x0, 0x40000fffffb, 0x802) ioctl$FS_IOC_FSGETXATTR(r0, 0x8004550f, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) 22:54:26 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb", 0x27}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0x24}], 0x2) 22:54:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb91", 0x74}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:26 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:26 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2a", 0x2e}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0x24}], 0x2) 22:54:26 executing program 5: r0 = syz_open_dev$usb(0x0, 0x40000fffffb, 0x802) ioctl$FS_IOC_FSGETXATTR(r0, 0x8004550f, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) [ 559.138867][T24113] debugfs: File 'dropped' in directory 'loop0' already present! [ 559.173678][T24113] debugfs: File 'msg' in directory 'loop0' already present! [ 559.245067][T24113] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:26 executing program 5: r0 = syz_open_dev$usb(0x0, 0x40000fffffb, 0x802) ioctl$FS_IOC_FSGETXATTR(r0, 0x8004550f, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) 22:54:26 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2a", 0x2e}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0x24}], 0x2) 22:54:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb91", 0x74}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:26 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x0, 0x802) ioctl$FS_IOC_FSGETXATTR(r0, 0x8004550f, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) [ 559.815110][T24142] debugfs: File 'dropped' in directory 'loop0' already present! [ 559.864207][T24142] debugfs: File 'msg' in directory 'loop0' already present! 22:54:27 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc"], 0x46) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:27 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2a", 0x2e}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0x24}], 0x2) 22:54:27 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:27 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x0, 0x802) ioctl$FS_IOC_FSGETXATTR(r0, 0x8004550f, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) [ 559.942361][T24142] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:27 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c", 0x31}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0x24}], 0x2) 22:54:27 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x0, 0x802) ioctl$FS_IOC_FSGETXATTR(r0, 0x8004550f, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) 22:54:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:27 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb91", 0x74}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:27 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c", 0x31}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0x24}], 0x2) 22:54:27 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x8004550f, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) 22:54:27 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c", 0x31}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0x24}], 0x2) [ 560.559073][T24173] debugfs: File 'dropped' in directory 'loop0' already present! 22:54:27 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 560.601596][T24173] debugfs: File 'msg' in directory 'loop0' already present! [ 560.691743][T24173] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:28 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc8715"], 0x48) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:28 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x8004550f, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) 22:54:28 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b4", 0x33}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0x24}], 0x2) 22:54:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a39495341", 0xae}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:28 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:28 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x8004550f, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) 22:54:28 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b4", 0x33}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0x24}], 0x2) [ 561.196857][T24200] debugfs: File 'dropped' in directory 'loop0' already present! [ 561.229678][T24200] debugfs: File 'msg' in directory 'loop0' already present! [ 561.291686][T24200] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:28 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="be42690bbbba459e7899004e0dd50738b64feab13891701d58a3c6f61e7b443ec676bd07de202eabe72f2873ecca06f6a87a670aced3f93463f6ac8a534fe40bcb744c12db3d0d42b52a7594e433e875eb91012a1b2ae413", 0x58}], 0x1) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="ae88bff8c90002005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b4", 0x33}, {&(0x7f0000000280)="aa04484ed0e5910aa84d4577670e12d9fc56c9953fbd806371162abf7ca71e023a27b238", 0x24}], 0x2) 22:54:28 executing program 5: syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) 22:54:28 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a39495341", 0xae}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="abc1abec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$binfmt_script(r1, &(0x7f0000000080)=ANY=[], 0x182) recvmmsg(r1, &(0x7f000000b4c0)=[{{0x0, 0x0, &(0x7f0000001340)=[{&(0x7f00000001c0)=""/218, 0x7ffff000}], 0x1}}], 0x1, 0x0, 0x0) 22:54:29 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc8715"], 0x48) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:29 executing program 5: syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) 22:54:29 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) shutdown(r0, 0x1) recvfrom$inet(r0, 0x0, 0xffffff3e, 0x0, 0x0, 0x800e0077f) shutdown(r0, 0x0) 22:54:29 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a39495341", 0xae}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:29 executing program 5: syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) 22:54:29 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x1000000000000569, 0x0) recvfrom$inet(r0, 0x0, 0xffffff3e, 0x0, 0x0, 0x800e0077f) shutdown(r0, 0x0) [ 562.340319][T24252] debugfs: File 'dropped' in directory 'loop0' already present! 22:54:29 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) ioctl$FS_IOC_FSGETXATTR(r0, 0x8004550f, 0x0) [ 562.381999][T24252] debugfs: File 'msg' in directory 'loop0' already present! [ 562.456596][T24252] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:29 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:29 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac", 0xcb}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:29 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) ioctl$FS_IOC_FSGETXATTR(r0, 0x8004550f, 0x0) 22:54:30 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc8715"], 0x48) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/243, 0xf3}, {0x0}, {0x0}], 0x3}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000240)=[{&(0x7f0000000580)=""/194, 0xc2}, {0x0}], 0x2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xbf9d, 0x0, 0x0, 0x800e0053e) shutdown(r2, 0x0) r4 = socket$inet6_sctp(0x1c, 0x10000000003, 0x84) readv(r4, &(0x7f0000000ac0)=[{&(0x7f00000004c0)=""/147, 0x93}, {0x0}], 0x2) shutdown(r3, 0x0) shutdown(r1, 0x0) 22:54:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 562.973776][T24278] debugfs: File 'dropped' in directory 'loop0' already present! [ 563.006326][T24278] debugfs: File 'msg' in directory 'loop0' already present! 22:54:30 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) ioctl$FS_IOC_FSGETXATTR(r0, 0x8004550f, 0x0) [ 563.098549][T24278] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:30 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac", 0xcb}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) recvfrom$inet(r0, 0x0, 0xffffff3e, 0x0, 0x0, 0x800e0077f) shutdown(r0, 0x0) 22:54:30 executing program 3: shutdown(0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000080)=""/50, 0x32}, {0x0}], 0x2}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x893f, 0x0, 0x0, 0x800e00519) shutdown(r1, 0x0) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001980)=[{&(0x7f00000006c0)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) shutdown(r2, 0x0) shutdown(r0, 0x0) 22:54:30 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:30 executing program 5: 22:54:30 executing program 5: 22:54:30 executing program 3: 22:54:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac", 0xcb}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:31 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159f"], 0x49) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:31 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:31 executing program 5: 22:54:31 executing program 3: 22:54:31 executing program 5: 22:54:31 executing program 3: [ 564.187936][T24335] debugfs: File 'dropped' in directory 'loop0' already present! [ 564.217060][T24335] debugfs: File 'msg' in directory 'loop0' already present! [ 564.294287][T24335] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:31 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:31 executing program 5: 22:54:31 executing program 3: 22:54:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880", 0xd9}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:31 executing program 3: 22:54:31 executing program 5: 22:54:32 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159f"], 0x49) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:32 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:32 executing program 3: 22:54:32 executing program 5: 22:54:32 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880", 0xd9}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:32 executing program 5: 22:54:32 executing program 3: 22:54:32 executing program 5: [ 565.316589][T24386] debugfs: File 'dropped' in directory 'loop0' already present! [ 565.346842][T24386] debugfs: File 'msg' in directory 'loop0' already present! 22:54:32 executing program 3: [ 565.408556][T24386] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:32 executing program 5: 22:54:32 executing program 3: 22:54:32 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159f"], 0x49) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:32 executing program 5: 22:54:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880", 0xd9}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:32 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:33 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:33 executing program 3: 22:54:33 executing program 5: [ 565.968131][T24411] debugfs: File 'dropped' in directory 'loop0' already present! [ 566.026197][T24411] debugfs: File 'msg' in directory 'loop0' already present! 22:54:33 executing program 3: 22:54:33 executing program 5: [ 566.105616][T24411] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:33 executing program 3: 22:54:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff", 0xe0}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:33 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 566.613770][T24435] debugfs: File 'dropped' in directory 'loop0' already present! [ 566.641638][T24435] debugfs: File 'msg' in directory 'loop0' already present! [ 566.681358][T24435] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:33 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:33 executing program 5: 22:54:33 executing program 3: 22:54:33 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:34 executing program 5: 22:54:34 executing program 3: 22:54:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff", 0xe0}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:34 executing program 3: 22:54:34 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:34 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_READ(r1, 0x8008700b, &(0x7f0000000000)) 22:54:34 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$inet_sctp(r0, &(0x7f0000001880)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback}, 0x10, &(0x7f0000001780)=[{&(0x7f0000000140)='>', 0x1}], 0x1}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000003480)={0x0, 0x80, "33ada7bed441de9193802618a1885b94a57d9cc9b1bb5a13a8272da66ed30d45256aaaf23cdd1044fce0b0fdb557e43649edc1ef341213f3f96dc2aec84f7451ae4dd1edbabd578c6ac9816d4cb7a24f25d43995bd2412094ca68ed08390c5f2b65e45c9578ac19759099e6e5c51c14e10c6cc022dd0d979f8f97a0844936802"}, &(0x7f00000044c0)=0x88) [ 567.335057][T24466] debugfs: File 'dropped' in directory 'loop0' already present! 22:54:34 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 567.382149][T24466] debugfs: File 'msg' in directory 'loop0' already present! [ 567.400206][T24466] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:35 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:35 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000100)="1155a5465e0bcfe47bf070") shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000340)=""/196) 22:54:35 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:35 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:35 executing program 3: r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000040)=0x1) write$UHID_INPUT(r0, 0x0, 0x0) 22:54:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff", 0xe0}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0x0) 22:54:35 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="020700090200000000008000bd5a00000021472aefe41c4301889c91ff7f000000001600aa20475d9f02d3869feeed860e6cb5da323ae0cad7cb69050046b653e1010000000000000041374611"], 0x10}}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 568.130955][T24500] debugfs: File 'dropped' in directory 'loop0' already present! [ 568.156887][T24500] debugfs: File 'msg' in directory 'loop0' already present! [ 568.260183][T24500] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:35 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1", 0xe4}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_tables_targets\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000181, 0x600) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 22:54:35 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 568.840875][T24535] debugfs: File 'dropped' in directory 'loop0' already present! [ 568.895682][T24535] debugfs: File 'msg' in directory 'loop0' already present! 22:54:36 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:36 executing program 3: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x274e}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000280)=0x63, 0x2) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000140)={0xe, 0x0, 0x9, 0x1f, 0x9a, "ed30b285dda781ed8d9b5801b13a23515efdcc4138dbdb596a1214c0d22a4c5e40bee53f26fbafea8bce527ca34851d146294f4f17a6006e4c8409d7a1188bdab2d94fc451b413b0e07efd75da49cde0dd26fbecb5e60d8c272f1ab6f5d1a089412c442a0282f1b731782d3a4ac59c858b034f7d0241d6ce0849ac738c7ee70da323155aafd437d97dc1f4b615c66dabe154f867576a64943094"}, 0xa6) ioctl(r2, 0x0, &(0x7f00000000c0)) mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) clone(0xa0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lchown(0x0, 0x0, 0x0) 22:54:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 568.960898][T24535] debugfs: File 'trace0' in directory 'loop0' already present! [ 569.037466][T24553] raw_sendmsg: syz-executor.3 forgot to set AF_INET. Fix it! 22:54:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1", 0xe4}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x2, &(0x7f0000000240)=0xfff, 0x4) sendto$inet(r1, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) sendto$inet(r1, &(0x7f00000002c0)="4079dc02000000cce59ae48108271c786baa557a5e8bd60b9a9f89ca05bf422eb8adf9934a1e93d20f000000000000b6ef6d67020423", 0xfffffffffffffdce, 0x0, 0x0, 0xfffffffffffffe97) shutdown(r1, 0x400000000000001) 22:54:36 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 569.806592][T24637] debugfs: File 'dropped' in directory 'loop0' already present! [ 569.840422][T24637] debugfs: File 'msg' in directory 'loop0' already present! [ 569.873220][T24637] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:37 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x7c774bf2) write$binfmt_aout(r1, &(0x7f0000000a80)=ANY=[], 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, r1, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x100000001, 0x4) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can={0x1d, 0x0, 0x797ff5f, 0x5fff9930}, 0x200056d0, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x40000, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 22:54:37 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, 0x0, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1", 0xe4}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 570.494074][T24663] debugfs: File 'dropped' in directory 'loop0' already present! [ 570.578002][T24663] debugfs: File 'msg' in directory 'loop0' already present! 22:54:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 570.672889][T24663] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861f", 0xe6}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:38 executing program 3: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x274e}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000280)=0x63, 0x2) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000140)={0xe, 0x0, 0x9, 0x1f, 0x9a, "ed30b285dda781ed8d9b5801b13a23515efdcc4138dbdb596a1214c0d22a4c5e40bee53f26fbafea8bce527ca34851d146294f4f17a6006e4c8409d7a1188bdab2d94fc451b413b0e07efd75da49cde0dd26fbecb5e60d8c272f1ab6f5d1a089412c442a0282f1b731782d3a4ac59c858b034f7d0241d6ce0849ac738c7ee70da323155aafd437d97dc1f4b615c66dabe154f867576a64943094"}, 0xa6) ioctl(r2, 0x0, &(0x7f00000000c0)) mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) clone(0xa0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lchown(0x0, 0x0, 0x0) 22:54:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:38 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, 0x0, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) [ 571.130693][T24679] debugfs: File 'dropped' in directory 'loop0' already present! [ 571.191907][T24679] debugfs: File 'msg' in directory 'loop0' already present! [ 571.258325][T24679] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 571.493676][T24667] syz-executor.5 (24667) used greatest stack depth: 22424 bytes left 22:54:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861f", 0xe6}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 571.901158][T24706] debugfs: File 'dropped' in directory 'loop0' already present! 22:54:39 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x7c774bf2) write$binfmt_aout(r1, &(0x7f0000000a80)=ANY=[], 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, r1, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x100000001, 0x4) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can={0x1d, 0x0, 0x797ff5f, 0x5fff9930}, 0x200056d0, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x40000, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 571.943774][T24706] debugfs: File 'msg' in directory 'loop0' already present! 22:54:39 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, 0x0, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:39 executing program 3: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x274e}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000280)=0x63, 0x2) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000140)={0xe, 0x0, 0x9, 0x1f, 0x9a, "ed30b285dda781ed8d9b5801b13a23515efdcc4138dbdb596a1214c0d22a4c5e40bee53f26fbafea8bce527ca34851d146294f4f17a6006e4c8409d7a1188bdab2d94fc451b413b0e07efd75da49cde0dd26fbecb5e60d8c272f1ab6f5d1a089412c442a0282f1b731782d3a4ac59c858b034f7d0241d6ce0849ac738c7ee70da323155aafd437d97dc1f4b615c66dabe154f867576a64943094"}, 0xa6) ioctl(r2, 0x0, &(0x7f00000000c0)) mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) clone(0xa0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lchown(0x0, 0x0, 0x0) [ 572.043647][T24706] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:39 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861f", 0xe6}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) [ 572.609089][T24734] debugfs: File 'dropped' in directory 'loop0' already present! 22:54:39 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 572.670159][T24734] debugfs: File 'msg' in directory 'loop0' already present! [ 572.710078][T24734] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:40 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:40 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0), 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, 0x0) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:40 executing program 3: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x274e}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000280)=0x63, 0x2) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000140)={0xe, 0x0, 0x9, 0x1f, 0x9a, "ed30b285dda781ed8d9b5801b13a23515efdcc4138dbdb596a1214c0d22a4c5e40bee53f26fbafea8bce527ca34851d146294f4f17a6006e4c8409d7a1188bdab2d94fc451b413b0e07efd75da49cde0dd26fbecb5e60d8c272f1ab6f5d1a089412c442a0282f1b731782d3a4ac59c858b034f7d0241d6ce0849ac738c7ee70da323155aafd437d97dc1f4b615c66dabe154f867576a64943094"}, 0xa6) ioctl(r2, 0x0, &(0x7f00000000c0)) mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) clone(0xa0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lchown(0x0, 0x0, 0x0) [ 573.490010][T24750] debugfs: File 'dropped' in directory 'loop0' already present! 22:54:40 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 573.531476][T24750] debugfs: File 'msg' in directory 'loop0' already present! [ 573.596789][T24750] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:40 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x7c774bf2) write$binfmt_aout(r1, &(0x7f0000000a80)=ANY=[], 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, r1, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x100000001, 0x4) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can={0x1d, 0x0, 0x797ff5f, 0x5fff9930}, 0x200056d0, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x40000, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 22:54:40 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, 0x0) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:41 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0), 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:41 executing program 3: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x274e}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000280)=0x63, 0x2) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000140)={0xe, 0x0, 0x9, 0x1f, 0x9a, "ed30b285dda781ed8d9b5801b13a23515efdcc4138dbdb596a1214c0d22a4c5e40bee53f26fbafea8bce527ca34851d146294f4f17a6006e4c8409d7a1188bdab2d94fc451b413b0e07efd75da49cde0dd26fbecb5e60d8c272f1ab6f5d1a089412c442a0282f1b731782d3a4ac59c858b034f7d0241d6ce0849ac738c7ee70da323155aafd437d97dc1f4b615c66dabe154f867576a64943094"}, 0xa6) ioctl(r2, 0x0, &(0x7f00000000c0)) mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) clone(0xa0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:54:41 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 574.173655][T24773] debugfs: File 'dropped' in directory 'loop0' already present! [ 574.238834][T24773] debugfs: File 'msg' in directory 'loop0' already present! [ 574.297727][T24773] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:41 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, 0x0) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:41 executing program 3: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x274e}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000280)=0x63, 0x2) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000140)={0xe, 0x0, 0x9, 0x1f, 0x9a, "ed30b285dda781ed8d9b5801b13a23515efdcc4138dbdb596a1214c0d22a4c5e40bee53f26fbafea8bce527ca34851d146294f4f17a6006e4c8409d7a1188bdab2d94fc451b413b0e07efd75da49cde0dd26fbecb5e60d8c272f1ab6f5d1a089412c442a0282f1b731782d3a4ac59c858b034f7d0241d6ce0849ac738c7ee70da323155aafd437d97dc1f4b615c66dabe154f867576a64943094"}, 0xa6) ioctl(r2, 0x0, &(0x7f00000000c0)) mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) clone(0xa0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 574.844221][T24798] debugfs: File 'dropped' in directory 'loop0' already present! 22:54:42 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 574.900924][T24798] debugfs: File 'msg' in directory 'loop0' already present! [ 574.988561][T24798] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0x0, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:42 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 575.418364][T24813] debugfs: File 'dropped' in directory 'loop0' already present! [ 575.441029][T24813] debugfs: File 'msg' in directory 'loop0' already present! [ 575.459231][T24813] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:42 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x7c774bf2) write$binfmt_aout(r1, &(0x7f0000000a80)=ANY=[], 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, r1, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x100000001, 0x4) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can={0x1d, 0x0, 0x797ff5f, 0x5fff9930}, 0x200056d0, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x40000, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 22:54:42 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0), 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) [ 575.464430][T24776] syz-executor.5 (24776) used greatest stack depth: 22360 bytes left 22:54:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0x0, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:42 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:43 executing program 3: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x274e}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000280)=0x63, 0x2) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000140)={0xe, 0x0, 0x9, 0x1f, 0x9a, "ed30b285dda781ed8d9b5801b13a23515efdcc4138dbdb596a1214c0d22a4c5e40bee53f26fbafea8bce527ca34851d146294f4f17a6006e4c8409d7a1188bdab2d94fc451b413b0e07efd75da49cde0dd26fbecb5e60d8c272f1ab6f5d1a089412c442a0282f1b731782d3a4ac59c858b034f7d0241d6ce0849ac738c7ee70da323155aafd437d97dc1f4b615c66dabe154f867576a64943094"}, 0xa6) ioctl(r2, 0x0, &(0x7f00000000c0)) mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) clone(0xa0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 575.999044][T24832] debugfs: File 'dropped' in directory 'loop0' already present! [ 576.036363][T24832] debugfs: File 'msg' in directory 'loop0' already present! [ 576.064867][T24832] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:43 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:43 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0x0, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:43 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) [ 576.602887][T24854] debugfs: File 'dropped' in directory 'loop0' already present! [ 576.625755][T24854] debugfs: File 'msg' in directory 'loop0' already present! [ 576.640420][T24854] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:43 executing program 3: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x274e}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000280)=0x63, 0x2) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000140)={0xe, 0x0, 0x9, 0x1f, 0x9a, "ed30b285dda781ed8d9b5801b13a23515efdcc4138dbdb596a1214c0d22a4c5e40bee53f26fbafea8bce527ca34851d146294f4f17a6006e4c8409d7a1188bdab2d94fc451b413b0e07efd75da49cde0dd26fbecb5e60d8c272f1ab6f5d1a089412c442a0282f1b731782d3a4ac59c858b034f7d0241d6ce0849ac738c7ee70da323155aafd437d97dc1f4b615c66dabe154f867576a64943094"}, 0xa6) ioctl(r2, 0x0, &(0x7f00000000c0)) mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) clone(0xa0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:54:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, 0x0) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:44 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x7c774bf2) write$binfmt_aout(r1, &(0x7f0000000a80)=ANY=[], 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, r1, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x100000001, 0x4) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can={0x1d, 0x0, 0x797ff5f, 0x5fff9930}, 0x200056d0, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x40000, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 22:54:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 577.083043][T24870] debugfs: File 'dropped' in directory 'loop0' already present! [ 577.151440][T24870] debugfs: File 'msg' in directory 'loop0' already present! [ 577.258274][T24870] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:44 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, 0x0) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:44 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 577.801899][T24890] debugfs: File 'dropped' in directory 'loop0' already present! [ 577.874218][T24890] debugfs: File 'msg' in directory 'loop0' already present! [ 577.922731][T24890] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:45 executing program 3: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x274e}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000280)=0x63, 0x2) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000140)={0xe, 0x0, 0x9, 0x1f, 0x9a, "ed30b285dda781ed8d9b5801b13a23515efdcc4138dbdb596a1214c0d22a4c5e40bee53f26fbafea8bce527ca34851d146294f4f17a6006e4c8409d7a1188bdab2d94fc451b413b0e07efd75da49cde0dd26fbecb5e60d8c272f1ab6f5d1a089412c442a0282f1b731782d3a4ac59c858b034f7d0241d6ce0849ac738c7ee70da323155aafd437d97dc1f4b615c66dabe154f867576a64943094"}, 0xa6) ioctl(r2, 0x0, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) clone(0xa0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:54:45 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:45 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, 0x0) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:45 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 578.490063][T24913] debugfs: File 'dropped' in directory 'loop0' already present! [ 578.521783][T24913] debugfs: File 'msg' in directory 'loop0' already present! 22:54:45 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) [ 578.613414][T24913] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:45 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(0x0, 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:46 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x7c774bf2) write$binfmt_aout(r1, &(0x7f0000000a80)=ANY=[], 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, r1, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x100000001, 0x4) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can={0x1d, 0x0, 0x797ff5f, 0x5fff9930}, 0x200056d0, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x40000, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 22:54:46 executing program 3: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x274e}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000280)=0x63, 0x2) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000140)={0xe, 0x0, 0x9, 0x1f, 0x9a, "ed30b285dda781ed8d9b5801b13a23515efdcc4138dbdb596a1214c0d22a4c5e40bee53f26fbafea8bce527ca34851d146294f4f17a6006e4c8409d7a1188bdab2d94fc451b413b0e07efd75da49cde0dd26fbecb5e60d8c272f1ab6f5d1a089412c442a0282f1b731782d3a4ac59c858b034f7d0241d6ce0849ac738c7ee70da323155aafd437d97dc1f4b615c66dabe154f867576a64943094"}, 0xa6) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) clone(0xa0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:54:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 579.105534][T24929] debugfs: File 'dropped' in directory 'loop0' already present! [ 579.146438][T24929] debugfs: File 'msg' in directory 'loop0' already present! [ 579.181597][T24929] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:46 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:46 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, 0x0) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:46 executing program 3: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x274e}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000280)=0x63, 0x2) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) clone(0xa0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:54:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:46 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(0x0, 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) [ 579.833308][T24959] debugfs: File 'dropped' in directory 'loop0' already present! [ 579.907923][T24959] debugfs: File 'msg' in directory 'loop0' already present! 22:54:47 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 580.002619][T24959] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:47 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, 0x0) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:47 executing program 3: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x274e}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000280)=0x63, 0x2) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) clone(0xa0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:54:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(0x0, 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) [ 580.453380][T24980] debugfs: File 'dropped' in directory 'loop0' already present! [ 580.496696][T24980] debugfs: File 'msg' in directory 'loop0' already present! [ 580.565717][T24980] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:47 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x7c774bf2) write$binfmt_aout(r1, &(0x7f0000000a80)=ANY=[], 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, r1, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x100000001, 0x4) accept$alg(r0, 0x0, 0x0) 22:54:47 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 580.622010][T24949] syz-executor.5 (24949) used greatest stack depth: 22264 bytes left 22:54:47 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x0) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:48 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:48 executing program 3: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x274e}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) clone(0xa0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 581.337454][T25004] debugfs: File 'dropped' in directory 'loop0' already present! [ 581.394569][T25004] debugfs: File 'msg' in directory 'loop0' already present! 22:54:48 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, 0x0) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) [ 581.462748][T25004] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:48 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:48 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x7c774bf2) write$binfmt_aout(r1, &(0x7f0000000a80)=ANY=[], 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, r1, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x100000001, 0x4) 22:54:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x0) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:49 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 582.062240][T25031] debugfs: File 'dropped' in directory 'loop0' already present! [ 582.138879][T25031] debugfs: File 'msg' in directory 'loop0' already present! [ 582.218318][T25031] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:49 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0x0, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:49 executing program 3: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x274e}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) clone(0xa0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:54:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x0) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:49 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 582.821057][T25050] debugfs: File 'dropped' in directory 'loop0' already present! 22:54:50 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x7c774bf2) write$binfmt_aout(r1, &(0x7f0000000a80)=ANY=[], 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, r1, 0x0) [ 582.873869][T25050] debugfs: File 'msg' in directory 'loop0' already present! [ 582.939445][T25050] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:50 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:50 executing program 3: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x274e}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) clone(0xa0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:54:50 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0x0, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) [ 583.662915][T25071] debugfs: File 'dropped' in directory 'loop0' already present! [ 583.689473][T25071] debugfs: File 'msg' in directory 'loop0' already present! [ 583.710669][T25071] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:51 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x7c774bf2) write$binfmt_aout(r1, &(0x7f0000000a80)=ANY=[], 0x0) 22:54:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 584.234401][T25090] debugfs: File 'dropped' in directory 'loop0' already present! [ 584.278942][T25090] debugfs: File 'msg' in directory 'loop0' already present! [ 584.341883][T25090] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:51 executing program 3: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x274e}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) clone(0xa0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:54:52 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:52 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0x0, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:52 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x7c774bf2) 22:54:52 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 585.220432][T25114] debugfs: File 'dropped' in directory 'loop0' already present! [ 585.262477][T25114] debugfs: File 'msg' in directory 'loop0' already present! [ 585.378003][T25114] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:52 executing program 3: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x274e}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) clone(0xa0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:54:52 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:52 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0x0, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:53 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 585.948076][T25140] debugfs: File 'dropped' in directory 'loop0' already present! 22:54:53 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x0, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) [ 585.996675][T25140] debugfs: File 'msg' in directory 'loop0' already present! [ 586.100881][T25140] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:53 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x7c774bf2) 22:54:53 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0x0, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:53 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:53 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x7c774bf2) [ 586.678960][T25157] debugfs: File 'dropped' in directory 'loop0' already present! [ 586.714808][T25157] debugfs: File 'msg' in directory 'loop0' already present! [ 586.784052][T25157] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:53 executing program 3: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x274e}}, 0x18) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) clone(0xa0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:54:53 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x7c774bf2) 22:54:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:54 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) socket$alg(0x26, 0x5, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774bf2) 22:54:54 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0x0, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:54 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x0, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 587.341726][T25184] debugfs: File 'dropped' in directory 'loop0' already present! 22:54:54 executing program 3: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) clone(0xa0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 587.468726][T25184] debugfs: File 'msg' in directory 'loop0' already present! [ 587.550780][T25184] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:54 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, 0x0, 0x0) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:55 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x0, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) [ 587.953969][T25206] debugfs: File 'dropped' in directory 'loop0' already present! [ 587.968456][T25206] debugfs: File 'msg' in directory 'loop0' already present! [ 587.990531][T25206] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:55 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774bf2) 22:54:55 executing program 3: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) clone(0xa0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:54:55 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:55 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, 0x0, 0x0) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:55 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:55 executing program 3: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) clone(0xa0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:54:55 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:56 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, 0x0, 0x0) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:56 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774bf2) 22:54:56 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 589.229023][T25245] debugfs: File 'dropped' in directory 'loop0' already present! 22:54:56 executing program 3: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) clone(0xa0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:54:56 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x0, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) [ 589.271243][T25245] debugfs: File 'msg' in directory 'loop0' already present! [ 589.310121][T25245] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:56 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280), 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) [ 589.787760][T25270] debugfs: File 'dropped' in directory 'loop0' already present! [ 589.802307][T25270] debugfs: File 'msg' in directory 'loop0' already present! [ 589.819281][T25270] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:57 executing program 3: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) socket(0x40000000002, 0x3, 0x2) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) clone(0xa0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:54:57 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:57 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x0, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:57 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774bf2) 22:54:57 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280), 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:57 executing program 3: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) clone(0xa0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:54:57 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774bf2) 22:54:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:57 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774bf2) [ 590.500235][T25293] debugfs: File 'dropped' in directory 'loop0' already present! [ 590.543925][T25293] debugfs: File 'msg' in directory 'loop0' already present! [ 590.662272][T25293] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:57 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:57 executing program 3: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) clone(0xa0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:54:57 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x7c774bf2) 22:54:58 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x7c774bf2) 22:54:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280), 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:58 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x0, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:54:58 executing program 3: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) clone(0xa0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:54:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 591.255446][T25334] debugfs: File 'dropped' in directory 'loop0' already present! 22:54:58 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x7c774bf2) [ 591.323476][T25334] debugfs: File 'msg' in directory 'loop0' already present! [ 591.333213][T25334] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:58 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:58 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x0) 22:54:58 executing program 3: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) clone(0xa0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:54:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x0, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:58 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x0) 22:54:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 591.957162][T25359] debugfs: File 'dropped' in directory 'loop0' already present! [ 591.965530][T25359] debugfs: File 'msg' in directory 'loop0' already present! 22:54:59 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x0, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) [ 592.013034][T25359] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:59 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x0) 22:54:59 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:59 executing program 3: connect$unix(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) clone(0xa0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:54:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x0, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:54:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:54:59 executing program 5: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x274e}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000280)=0x63, 0x2) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000140)={0xe, 0x0, 0x9, 0x1f, 0x9a, "ed30b285dda781ed8d9b5801b13a23515efdcc4138dbdb596a1214c0d22a4c5e40bee53f26fbafea8bce527ca34851d146294f4f17a6006e4c8409d7a1188bdab2d94fc451b413b0e07efd75da49cde0dd26fbecb5e60d8c272f1ab6f5d1a089412c442a0282f1b731782d3a4ac59c858b034f7d0241d6ce0849ac738c7ee70da323155aafd437d97dc1f4b615c66dabe154f867576a64943094"}, 0xa6) ioctl(r2, 0x0, &(0x7f00000000c0)) mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) clone(0xa0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lchown(0x0, 0x0, 0x0) [ 592.533840][T25386] debugfs: File 'dropped' in directory 'loop0' already present! 22:54:59 executing program 3: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) clone(0xa0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 592.639321][T25386] debugfs: File 'msg' in directory 'loop0' already present! [ 592.708669][T25386] debugfs: File 'trace0' in directory 'loop0' already present! 22:54:59 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:00 executing program 3: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x10, 0xffffffffffffffff, 0x1000000) clone(0xa0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:55:00 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x0, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:55:00 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 593.208289][T25412] debugfs: File 'dropped' in directory 'loop0' already present! [ 593.241923][T25412] debugfs: File 'msg' in directory 'loop0' already present! 22:55:00 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x0, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:55:00 executing program 3: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x10, 0xffffffffffffffff, 0x1000000) clone(0xa0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 593.358441][T25412] debugfs: File 'trace0' in directory 'loop0' already present! 22:55:00 executing program 5: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x274e}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000280)=0x63, 0x2) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000140)={0xe, 0x0, 0x9, 0x1f, 0x9a, "ed30b285dda781ed8d9b5801b13a23515efdcc4138dbdb596a1214c0d22a4c5e40bee53f26fbafea8bce527ca34851d146294f4f17a6006e4c8409d7a1188bdab2d94fc451b413b0e07efd75da49cde0dd26fbecb5e60d8c272f1ab6f5d1a089412c442a0282f1b731782d3a4ac59c858b034f7d0241d6ce0849ac738c7ee70da323155aafd437d97dc1f4b615c66dabe154f867576a64943094"}, 0xa6) ioctl(r2, 0x0, &(0x7f00000000c0)) mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) clone(0xa0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lchown(0x0, 0x0, 0x0) 22:55:00 executing program 3: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x10, 0xffffffffffffffff, 0x1000000) clone(0xa0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:55:00 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:00 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(0x0, &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) [ 593.894761][T25435] debugfs: File 'dropped' in directory 'loop0' already present! 22:55:01 executing program 3: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x0) clone(0xa0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 593.945555][T25435] debugfs: File 'msg' in directory 'loop0' already present! 22:55:01 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 594.046723][T25435] debugfs: File 'trace0' in directory 'loop0' already present! 22:55:01 executing program 3: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:55:01 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(0x0, &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:55:01 executing program 5: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x274e}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000280)=0x63, 0x2) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000140)={0xe, 0x0, 0x9, 0x1f, 0x9a, "ed30b285dda781ed8d9b5801b13a23515efdcc4138dbdb596a1214c0d22a4c5e40bee53f26fbafea8bce527ca34851d146294f4f17a6006e4c8409d7a1188bdab2d94fc451b413b0e07efd75da49cde0dd26fbecb5e60d8c272f1ab6f5d1a089412c442a0282f1b731782d3a4ac59c858b034f7d0241d6ce0849ac738c7ee70da323155aafd437d97dc1f4b615c66dabe154f867576a64943094"}, 0xa6) ioctl(r2, 0x0, &(0x7f00000000c0)) mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) clone(0xa0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lchown(0x0, 0x0, 0x0) 22:55:01 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x0, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:55:01 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 594.606913][T25458] debugfs: File 'dropped' in directory 'loop0' already present! 22:55:01 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000100)="1155a5465e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 594.650168][T25458] debugfs: File 'msg' in directory 'loop0' already present! [ 594.704947][T25458] debugfs: File 'trace0' in directory 'loop0' already present! 22:55:02 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(0x0, &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:55:02 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:02 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='cgroup2\x00\x05\x8b\\\x01\x8fP\xbd\xf1d\\h\xe2l\xad\x8f\x1e\xb7`\xda\xf2#\xb4\xd6#\xae\x1e\t\tB/\x04+a\x14\xe8\x82\aDKY\xbb\x0e\x0e\xe1=\xe7\x838V\xba\xb9\xe4\x05\x81\x8aO\x14P\x87\xf3\x01\x1c\xf3Z\x8cY\xc5m\x8e0\xa4U\xa5\x029\xc6\x8cb\xef\xe9z(\x19D\xa8\xc0\xc0j&\xfc\xd2W\xear\x8e\'\xe2\xc9e\xcdq\x89\x18U5\x0f\x84Q\xb4\xc5\x90Z\xcd\xb38\xbd\x9f\rag\x04\x04!GT\xd7\x0f\xfd\xe6\x9c\xac\x88X\x17U\xebE\x83\x04\xd7', 0x0, 0x0) r0 = open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r2, &(0x7f00000012c0)='\f', 0xffffff98, 0x3075, 0x0, 0x222) 22:55:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:02 executing program 5: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x274e}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000280)=0x63, 0x2) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000140)={0xe, 0x0, 0x9, 0x1f, 0x9a, "ed30b285dda781ed8d9b5801b13a23515efdcc4138dbdb596a1214c0d22a4c5e40bee53f26fbafea8bce527ca34851d146294f4f17a6006e4c8409d7a1188bdab2d94fc451b413b0e07efd75da49cde0dd26fbecb5e60d8c272f1ab6f5d1a089412c442a0282f1b731782d3a4ac59c858b034f7d0241d6ce0849ac738c7ee70da323155aafd437d97dc1f4b615c66dabe154f867576a64943094"}, 0xa6) ioctl(r2, 0x0, &(0x7f00000000c0)) mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) clone(0xa0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 595.204703][T25484] debugfs: File 'dropped' in directory 'loop0' already present! [ 595.270573][T25484] debugfs: File 'msg' in directory 'loop0' already present! [ 595.349445][T25484] debugfs: File 'trace0' in directory 'loop0' already present! 22:55:02 executing program 3: socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) 22:55:02 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x0, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:55:02 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:55:02 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 595.931109][T25518] debugfs: File 'dropped' in directory 'loop0' already present! [ 596.008021][T25518] debugfs: File 'msg' in directory 'loop0' already present! 22:55:03 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 596.097745][T25518] debugfs: File 'trace0' in directory 'loop0' already present! 22:55:03 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:55:03 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000b40)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$UI_SET_EVBIT(r0, 0x40045567, 0x0) 22:55:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:03 executing program 5: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x274e}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000280)=0x63, 0x2) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000140)={0xe, 0x0, 0x9, 0x1f, 0x9a, "ed30b285dda781ed8d9b5801b13a23515efdcc4138dbdb596a1214c0d22a4c5e40bee53f26fbafea8bce527ca34851d146294f4f17a6006e4c8409d7a1188bdab2d94fc451b413b0e07efd75da49cde0dd26fbecb5e60d8c272f1ab6f5d1a089412c442a0282f1b731782d3a4ac59c858b034f7d0241d6ce0849ac738c7ee70da323155aafd437d97dc1f4b615c66dabe154f867576a64943094"}, 0xa6) ioctl(r2, 0x0, &(0x7f00000000c0)) mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) [ 596.656920][T25540] input: syz1 as /devices/virtual/input/input11 22:55:03 executing program 3: setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 596.767463][T25541] debugfs: File 'dropped' in directory 'loop0' already present! [ 596.798069][T25541] debugfs: File 'msg' in directory 'loop0' already present! 22:55:03 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x0, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) [ 596.845105][T25541] debugfs: File 'trace0' in directory 'loop0' already present! 22:55:04 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:04 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:55:04 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:04 executing program 5: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x274e}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000280)=0x63, 0x2) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000140)={0xe, 0x0, 0x9, 0x1f, 0x9a, "ed30b285dda781ed8d9b5801b13a23515efdcc4138dbdb596a1214c0d22a4c5e40bee53f26fbafea8bce527ca34851d146294f4f17a6006e4c8409d7a1188bdab2d94fc451b413b0e07efd75da49cde0dd26fbecb5e60d8c272f1ab6f5d1a089412c442a0282f1b731782d3a4ac59c858b034f7d0241d6ce0849ac738c7ee70da323155aafd437d97dc1f4b615c66dabe154f867576a64943094"}, 0xa6) ioctl(r2, 0x0, &(0x7f00000000c0)) mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) [ 597.455461][T25569] debugfs: File 'dropped' in directory 'loop0' already present! [ 597.487111][T25569] debugfs: File 'msg' in directory 'loop0' already present! [ 597.542264][T25569] debugfs: File 'trace0' in directory 'loop0' already present! 22:55:04 executing program 3: setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:05 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:05 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x0, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:55:05 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x0, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) [ 598.229779][T25591] debugfs: File 'dropped' in directory 'loop0' already present! [ 598.250432][T25591] debugfs: File 'msg' in directory 'loop0' already present! [ 598.277524][T25591] debugfs: File 'trace0' in directory 'loop0' already present! 22:55:05 executing program 5: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x274e}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000280)=0x63, 0x2) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000140)={0xe, 0x0, 0x9, 0x1f, 0x9a, "ed30b285dda781ed8d9b5801b13a23515efdcc4138dbdb596a1214c0d22a4c5e40bee53f26fbafea8bce527ca34851d146294f4f17a6006e4c8409d7a1188bdab2d94fc451b413b0e07efd75da49cde0dd26fbecb5e60d8c272f1ab6f5d1a089412c442a0282f1b731782d3a4ac59c858b034f7d0241d6ce0849ac738c7ee70da323155aafd437d97dc1f4b615c66dabe154f867576a64943094"}, 0xa6) ioctl(r2, 0x0, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) [ 598.338874][T25592] syz-executor.2 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 22:55:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 598.452660][T25592] CPU: 0 PID: 25592 Comm: syz-executor.2 Not tainted 5.3.0-rc6-next-20190830 #75 [ 598.461843][T25592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 598.471902][T25592] Call Trace: [ 598.475200][T25592] dump_stack+0x172/0x1f0 [ 598.479534][T25592] dump_header+0x177/0x1152 [ 598.484038][T25592] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 598.489843][T25592] ? ___ratelimit+0x2c8/0x595 [ 598.494516][T25592] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 598.494537][T25592] ? lockdep_hardirqs_on+0x418/0x5d0 [ 598.494553][T25592] ? trace_hardirqs_on+0x67/0x240 [ 598.494571][T25592] ? pagefault_out_of_memory+0x11c/0x11c [ 598.494586][T25592] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 598.494602][T25592] ? ___ratelimit+0x60/0x595 [ 598.505676][T25592] ? do_raw_spin_unlock+0x57/0x270 [ 598.505696][T25592] oom_kill_process.cold+0x10/0x15 [ 598.505715][T25592] out_of_memory+0x334/0x1340 [ 598.505731][T25592] ? lock_downgrade+0x920/0x920 [ 598.505750][T25592] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 598.505768][T25592] ? oom_killer_disable+0x280/0x280 [ 598.516418][T25592] mem_cgroup_out_of_memory+0x1d8/0x240 [ 598.516437][T25592] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 598.516463][T25592] ? do_raw_spin_unlock+0x57/0x270 [ 598.516480][T25592] ? _raw_spin_unlock+0x2d/0x50 [ 598.516499][T25592] try_charge+0xf4b/0x1440 [ 598.516526][T25592] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 598.537095][T25592] ? find_held_lock+0x35/0x130 [ 598.537117][T25592] ? get_mem_cgroup_from_mm+0x139/0x320 [ 598.537139][T25592] ? lock_downgrade+0x920/0x920 [ 598.603775][T25592] ? percpu_ref_tryget_live+0x111/0x290 [ 598.609347][T25592] __memcg_kmem_charge_memcg+0x71/0xf0 [ 598.614824][T25592] ? memcg_kmem_put_cache+0x50/0x50 [ 598.620052][T25592] ? get_mem_cgroup_from_mm+0x156/0x320 [ 598.625617][T25592] __memcg_kmem_charge+0x13a/0x3a0 [ 598.630749][T25592] __alloc_pages_nodemask+0x4f7/0x900 [ 598.636138][T25592] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 598.641712][T25592] ? __alloc_pages_slowpath+0x2540/0x2540 [ 598.647454][T25592] ? percpu_ref_put_many+0xb6/0x190 [ 598.652668][T25592] ? lockdep_hardirqs_on+0x418/0x5d0 [ 598.657951][T25592] ? trace_hardirqs_on+0x67/0x240 [ 598.662986][T25592] copy_process+0x3f8/0x6830 [ 598.667575][T25592] ? psi_memstall_leave+0x12e/0x180 [ 598.672788][T25592] ? __cleanup_sighand+0x60/0x60 [ 598.677718][T25592] ? debug_smp_processor_id+0x3c/0x214 [ 598.683177][T25592] ? __kasan_check_read+0x11/0x20 [ 598.688203][T25592] ? __lockdep_free_key_range+0x120/0x120 [ 598.693931][T25592] _do_fork+0x146/0xfa0 [ 598.698093][T25592] ? copy_init_mm+0x20/0x20 [ 598.702619][T25592] ? lock_downgrade+0x920/0x920 [ 598.707492][T25592] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 598.713738][T25592] __x64_sys_clone+0x1ab/0x270 [ 598.718500][T25592] ? __ia32_sys_vfork+0xd0/0xd0 [ 598.723350][T25592] ? __blkcg_punt_bio_submit+0x1e0/0x1e0 [ 598.728985][T25592] ? mem_cgroup_handle_over_high+0x21b/0x2a0 [ 598.734965][T25592] ? do_syscall_64+0x26/0x760 [ 598.739641][T25592] ? lockdep_hardirqs_on+0x418/0x5d0 [ 598.744924][T25592] ? trace_hardirqs_on+0x67/0x240 [ 598.749968][T25592] do_syscall_64+0xfa/0x760 [ 598.754504][T25592] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 598.760388][T25592] RIP: 0033:0x45c249 [ 598.764285][T25592] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 598.783895][T25592] RSP: 002b:00007ffdd342e1d8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 598.792303][T25592] RAX: ffffffffffffffda RBX: 00007f25ca05e700 RCX: 000000000045c249 22:55:05 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 598.800274][T25592] RDX: 00007f25ca05e9d0 RSI: 00007f25ca05ddb0 RDI: 00000000003d0f00 [ 598.808246][T25592] RBP: 00007ffdd342e3f0 R08: 00007f25ca05e700 R09: 00007f25ca05e700 [ 598.816213][T25592] R10: 00007f25ca05e9d0 R11: 0000000000000202 R12: 0000000000000000 [ 598.824179][T25592] R13: 00007ffdd342e28f R14: 00007f25ca05e9c0 R15: 000000000075bfd4 22:55:06 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x0, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:55:06 executing program 3: setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 598.976225][T25592] memory: usage 307196kB, limit 307200kB, failcnt 493 [ 598.998257][T25592] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 599.024947][T25592] Memory cgroup stats for /syz2: [ 599.025057][T25592] anon 281886720 [ 599.025057][T25592] file 53248 [ 599.025057][T25592] kernel_stack 4456448 [ 599.025057][T25592] slab 8818688 [ 599.025057][T25592] sock 0 [ 599.025057][T25592] shmem 0 [ 599.025057][T25592] file_mapped 0 [ 599.025057][T25592] file_dirty 0 [ 599.025057][T25592] file_writeback 0 [ 599.025057][T25592] anon_thp 266338304 [ 599.025057][T25592] inactive_anon 0 [ 599.025057][T25592] active_anon 281964544 [ 599.025057][T25592] inactive_file 135168 [ 599.025057][T25592] active_file 16384 [ 599.025057][T25592] unevictable 0 [ 599.025057][T25592] slab_reclaimable 1622016 [ 599.025057][T25592] slab_unreclaimable 7196672 [ 599.025057][T25592] pgfault 48048 [ 599.025057][T25592] pgmajfault 0 [ 599.025057][T25592] workingset_refault 99 [ 599.025057][T25592] workingset_activate 0 [ 599.025057][T25592] workingset_nodereclaim 0 [ 599.025057][T25592] pgrefill 416 [ 599.025057][T25592] pgscan 448 [ 599.025057][T25592] pgsteal 205 22:55:06 executing program 5: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x274e}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000280)=0x63, 0x2) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000140)={0xe, 0x0, 0x9, 0x1f, 0x9a, "ed30b285dda781ed8d9b5801b13a23515efdcc4138dbdb596a1214c0d22a4c5e40bee53f26fbafea8bce527ca34851d146294f4f17a6006e4c8409d7a1188bdab2d94fc451b413b0e07efd75da49cde0dd26fbecb5e60d8c272f1ab6f5d1a089412c442a0282f1b731782d3a4ac59c858b034f7d0241d6ce0849ac738c7ee70da323155aafd437d97dc1f4b615c66dabe154f867576a64943094"}, 0xa6) ioctl(r2, 0x0, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) 22:55:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 599.226764][T25611] debugfs: File 'dropped' in directory 'loop0' already present! [ 599.266734][T25611] debugfs: File 'msg' in directory 'loop0' already present! [ 599.310460][T25611] debugfs: File 'trace0' in directory 'loop0' already present! [ 599.463557][T25592] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=23019,uid=0 22:55:06 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x0, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) [ 599.594110][T25592] Memory cgroup out of memory: Killed process 23019 (syz-executor.2) total-vm:72708kB, anon-rss:2204kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 22:55:06 executing program 5: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x274e}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000280)=0x63, 0x2) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000140)={0xe, 0x0, 0x9, 0x1f, 0x9a, "ed30b285dda781ed8d9b5801b13a23515efdcc4138dbdb596a1214c0d22a4c5e40bee53f26fbafea8bce527ca34851d146294f4f17a6006e4c8409d7a1188bdab2d94fc451b413b0e07efd75da49cde0dd26fbecb5e60d8c272f1ab6f5d1a089412c442a0282f1b731782d3a4ac59c858b034f7d0241d6ce0849ac738c7ee70da323155aafd437d97dc1f4b615c66dabe154f867576a64943094"}, 0xa6) ioctl(r2, 0x0, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) [ 599.646204][ T1064] oom_reaper: reaped process 23019 (syz-executor.2), now anon-rss:0kB, file-rss:34688kB, shmem-rss:0kB 22:55:06 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 599.818401][T25629] debugfs: File 'dropped' in directory 'loop0' already present! [ 599.866981][T25629] debugfs: File 'msg' in directory 'loop0' already present! [ 599.924492][T25629] debugfs: File 'trace0' in directory 'loop0' already present! 22:55:07 executing program 3: setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:07 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:55:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:07 executing program 5: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x274e}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000280)=0x63, 0x2) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000140)={0xe, 0x0, 0x9, 0x1f, 0x9a, "ed30b285dda781ed8d9b5801b13a23515efdcc4138dbdb596a1214c0d22a4c5e40bee53f26fbafea8bce527ca34851d146294f4f17a6006e4c8409d7a1188bdab2d94fc451b413b0e07efd75da49cde0dd26fbecb5e60d8c272f1ab6f5d1a089412c442a0282f1b731782d3a4ac59c858b034f7d0241d6ce0849ac738c7ee70da323155aafd437d97dc1f4b615c66dabe154f867576a64943094"}, 0xa6) mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) 22:55:07 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:55:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:08 executing program 3: setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) [ 600.895312][T25659] debugfs: File 'dropped' in directory 'loop0' already present! [ 600.916968][T25659] debugfs: File 'msg' in directory 'loop0' already present! [ 600.964633][T25659] debugfs: File 'trace0' in directory 'loop0' already present! 22:55:08 executing program 3: setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 22:55:08 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:55:08 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:08 executing program 5: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x274e}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000280)=0x63, 0x2) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) [ 601.477707][T25683] debugfs: File 'dropped' in directory 'loop0' already present! 22:55:08 executing program 3: setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) [ 601.547577][T25683] debugfs: File 'msg' in directory 'loop0' already present! 22:55:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:08 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) [ 601.620929][T25683] debugfs: File 'trace0' in directory 'loop0' already present! 22:55:08 executing program 3: setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:09 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:55:09 executing program 5: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x274e}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000280)=0x63, 0x2) mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) [ 602.228050][T25719] debugfs: File 'dropped' in directory 'loop0' already present! [ 602.237228][T25719] debugfs: File 'msg' in directory 'loop0' already present! [ 602.265425][T25719] debugfs: File 'trace0' in directory 'loop0' already present! 22:55:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, 0x0, 0x0) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:55:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:09 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:09 executing program 5: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x274e}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000280)=0x63, 0x2) mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) [ 602.768151][T25733] debugfs: File 'dropped' in directory 'loop0' already present! [ 602.816779][T25733] debugfs: File 'msg' in directory 'loop0' already present! 22:55:10 executing program 3: setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 602.875348][T25733] debugfs: File 'trace0' in directory 'loop0' already present! 22:55:10 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [], [0x6, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:55:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, 0x0, 0x0) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:55:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:10 executing program 5: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x274e}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) 22:55:10 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:10 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:55:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, 0x0, 0x0) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:55:11 executing program 3: setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 603.934329][T25771] debugfs: File 'dropped' in directory 'loop0' already present! [ 603.960458][T25771] debugfs: File 'msg' in directory 'loop0' already present! 22:55:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 604.015793][T25771] debugfs: File 'trace0' in directory 'loop0' already present! 22:55:11 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(0xffffffffffffffff, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:55:11 executing program 5: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x274e}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) 22:55:11 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 604.470436][T25796] debugfs: File 'dropped' in directory 'loop0' already present! [ 604.486231][T25796] debugfs: File 'msg' in directory 'loop0' already present! 22:55:11 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) [ 604.551669][T25796] debugfs: File 'trace0' in directory 'loop0' already present! 22:55:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:12 executing program 3: setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:12 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(0xffffffffffffffff, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:55:12 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:12 executing program 5: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x274e}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) 22:55:12 executing program 3: setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 605.224306][T25822] debugfs: File 'dropped' in directory 'loop0' already present! 22:55:12 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) [ 605.287553][T25822] debugfs: File 'msg' in directory 'loop0' already present! [ 605.362112][T25822] debugfs: File 'trace0' in directory 'loop0' already present! 22:55:12 executing program 3: setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:12 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:12 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(0xffffffffffffffff, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:55:12 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:12 executing program 5: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x274e}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) 22:55:13 executing program 3: setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 605.930113][T25851] debugfs: File 'dropped' in directory 'loop0' already present! [ 606.004102][T25851] debugfs: File 'msg' in directory 'loop0' already present! [ 606.075181][T25851] debugfs: File 'trace0' in directory 'loop0' already present! 22:55:13 executing program 3: setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:13 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:55:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:13 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x0, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:55:13 executing program 3: setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 606.598360][T25877] debugfs: File 'dropped' in directory 'loop0' already present! 22:55:13 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:13 executing program 5: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x274e}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) [ 606.643401][T25877] debugfs: File 'msg' in directory 'loop0' already present! [ 606.663710][T25880] syz-executor.2 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=0, oom_score_adj=1000 [ 606.724356][T25877] debugfs: File 'trace0' in directory 'loop0' already present! [ 606.746046][T25880] CPU: 0 PID: 25880 Comm: syz-executor.2 Not tainted 5.3.0-rc6-next-20190830 #75 [ 606.755227][T25880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 606.765293][T25880] Call Trace: [ 606.768687][T25880] dump_stack+0x172/0x1f0 [ 606.773039][T25880] dump_header+0x177/0x1152 [ 606.777563][T25880] ? pagefault_out_of_memory+0x11c/0x11c [ 606.783217][T25880] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 606.789045][T25880] ? ___ratelimit+0x60/0x595 [ 606.793652][T25880] ? do_raw_spin_unlock+0x57/0x270 [ 606.798813][T25880] oom_kill_process.cold+0x10/0x15 [ 606.803945][T25880] out_of_memory+0x334/0x1340 [ 606.808644][T25880] ? lock_downgrade+0x920/0x920 [ 606.813526][T25880] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 606.819410][T25880] ? oom_killer_disable+0x280/0x280 [ 606.824666][T25880] mem_cgroup_out_of_memory+0x1d8/0x240 [ 606.830219][T25880] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 606.830241][T25880] ? do_raw_spin_unlock+0x57/0x270 [ 606.830262][T25880] ? _raw_spin_unlock+0x2d/0x50 [ 606.840984][T25880] try_charge+0xf4b/0x1440 [ 606.841013][T25880] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 606.841032][T25880] ? cache_grow_begin+0x122/0xd20 [ 606.841050][T25880] ? find_held_lock+0x35/0x130 [ 606.841062][T25880] ? cache_grow_begin+0x122/0xd20 [ 606.841086][T25880] __memcg_kmem_charge_memcg+0x71/0xf0 [ 606.876099][T25880] ? memcg_kmem_put_cache+0x50/0x50 [ 606.876119][T25880] ? __kasan_check_read+0x11/0x20 [ 606.876139][T25880] cache_grow_begin+0x629/0xd20 [ 606.876156][T25880] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 606.876171][T25880] ? mempolicy_slab_node+0x139/0x390 [ 606.876189][T25880] fallback_alloc+0x1fd/0x2d0 [ 606.876210][T25880] ____cache_alloc_node+0x1bc/0x1d0 [ 606.912091][T25880] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 606.918352][T25880] kmem_cache_alloc+0x1ef/0x710 [ 606.923241][T25880] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 606.929006][T25880] vm_area_dup+0x21/0x170 [ 606.933356][T25880] dup_mm+0x549/0x1430 [ 606.937465][T25880] ? vm_area_dup+0x170/0x170 [ 606.942072][T25880] ? debug_mutex_init+0x2d/0x60 [ 606.946941][T25880] copy_process+0x2671/0x6830 [ 606.951632][T25880] ? debug_smp_processor_id+0x3c/0x214 [ 606.957122][T25880] ? __cleanup_sighand+0x60/0x60 [ 606.962073][T25880] ? __might_fault+0x12b/0x1e0 [ 606.966844][T25880] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 606.966861][T25880] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 606.966879][T25880] ? lockdep_hardirqs_on+0x418/0x5d0 [ 606.966903][T25880] _do_fork+0x146/0xfa0 [ 606.966919][T25880] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 606.966939][T25880] ? copy_init_mm+0x20/0x20 [ 606.977838][T25880] ? __this_cpu_preempt_check+0x3a/0x210 [ 606.987253][T25880] ? retint_kernel+0x2b/0x2b [ 606.987279][T25880] ? do_syscall_64+0xc0/0x760 [ 606.987300][T25880] __x64_sys_clone+0x1ab/0x270 [ 606.987323][T25880] ? __ia32_sys_vfork+0xd0/0xd0 22:55:14 executing program 3: setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 607.012128][T25880] ? do_syscall_64+0x26/0x760 [ 607.012148][T25880] ? lockdep_hardirqs_on+0x418/0x5d0 [ 607.012164][T25880] ? trace_hardirqs_on+0x67/0x240 [ 607.012183][T25880] do_syscall_64+0xfa/0x760 [ 607.012207][T25880] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 607.030763][T25880] RIP: 0033:0x459879 [ 607.030780][T25880] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 607.030789][T25880] RSP: 002b:00007f25ca07ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 607.030803][T25880] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000459879 [ 607.030812][T25880] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 607.030820][T25880] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 607.030830][T25880] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25ca07f6d4 [ 607.030840][T25880] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 00000000ffffffff 22:55:14 executing program 5: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x274e}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) 22:55:14 executing program 3: setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 607.125171][T25880] memory: usage 307200kB, limit 307200kB, failcnt 542 [ 607.149958][T25880] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 607.222044][T25880] Memory cgroup stats for /syz2: [ 607.223485][T25880] anon 280518656 [ 607.223485][T25880] file 53248 [ 607.223485][T25880] kernel_stack 4718592 [ 607.223485][T25880] slab 8953856 [ 607.223485][T25880] sock 0 [ 607.223485][T25880] shmem 0 [ 607.223485][T25880] file_mapped 0 [ 607.223485][T25880] file_dirty 0 [ 607.223485][T25880] file_writeback 0 [ 607.223485][T25880] anon_thp 264241152 [ 607.223485][T25880] inactive_anon 0 [ 607.223485][T25880] active_anon 280518656 22:55:14 executing program 3: setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 607.223485][T25880] inactive_file 135168 [ 607.223485][T25880] active_file 16384 [ 607.223485][T25880] unevictable 0 [ 607.223485][T25880] slab_reclaimable 1622016 [ 607.223485][T25880] slab_unreclaimable 7331840 [ 607.223485][T25880] pgfault 48741 [ 607.223485][T25880] pgmajfault 0 [ 607.223485][T25880] workingset_refault 99 [ 607.223485][T25880] workingset_activate 0 [ 607.223485][T25880] workingset_nodereclaim 0 [ 607.223485][T25880] pgrefill 515 [ 607.223485][T25880] pgscan 514 [ 607.223485][T25880] pgsteal 238 22:55:14 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:55:14 executing program 3: setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 607.446182][T25880] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2 [ 607.446325][T25880] ,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=22909,uid=0 [ 607.488710][T25880] Memory cgroup out of memory: Killed process 22909 (syz-executor.2) total-vm:72708kB, anon-rss:2204kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 22:55:14 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 607.649258][T25914] debugfs: File 'dropped' in directory 'loop0' already present! [ 607.686418][T25914] debugfs: File 'msg' in directory 'loop0' already present! [ 607.723648][T25914] debugfs: File 'trace0' in directory 'loop0' already present! 22:55:15 executing program 3: setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:15 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x0, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:55:15 executing program 5: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x274e}}, 0x18) mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) 22:55:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:55:15 executing program 3: setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 608.550904][T25946] debugfs: File 'dropped' in directory 'loop0' already present! [ 608.606634][T25946] debugfs: File 'msg' in directory 'loop0' already present! 22:55:15 executing program 3: setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 608.665816][T25946] debugfs: File 'trace0' in directory 'loop0' already present! [ 608.720698][T25952] syz-executor.2 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 608.738409][T25952] CPU: 0 PID: 25952 Comm: syz-executor.2 Not tainted 5.3.0-rc6-next-20190830 #75 [ 608.747551][T25952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 608.757593][T25952] Call Trace: [ 608.760871][T25952] dump_stack+0x172/0x1f0 [ 608.765192][T25952] dump_header+0x177/0x1152 [ 608.769690][T25952] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 608.775486][T25952] ? ___ratelimit+0x2c8/0x595 [ 608.780148][T25952] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 608.785943][T25952] ? lockdep_hardirqs_on+0x418/0x5d0 [ 608.791212][T25952] ? trace_hardirqs_on+0x67/0x240 [ 608.796223][T25952] ? pagefault_out_of_memory+0x11c/0x11c [ 608.801841][T25952] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 608.807632][T25952] ? ___ratelimit+0x60/0x595 [ 608.812204][T25952] ? do_raw_spin_unlock+0x57/0x270 [ 608.817303][T25952] oom_kill_process.cold+0x10/0x15 [ 608.822406][T25952] out_of_memory+0x334/0x1340 [ 608.827069][T25952] ? mark_held_locks+0xa4/0xf0 [ 608.831830][T25952] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 608.837270][T25952] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 608.842801][T25952] ? oom_killer_disable+0x280/0x280 [ 608.848093][T25952] ? trace_hardirqs_on_caller+0x6a/0x240 [ 608.853724][T25952] mem_cgroup_out_of_memory+0x1d8/0x240 [ 608.859258][T25952] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 608.864879][T25952] ? retint_kernel+0x2b/0x2b [ 608.869468][T25952] try_charge+0xf4b/0x1440 [ 608.873886][T25952] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 608.879416][T25952] ? lockdep_hardirqs_on+0x418/0x5d0 [ 608.884686][T25952] ? trace_hardirqs_on_caller+0x6a/0x240 [ 608.890309][T25952] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 608.895772][T25952] __memcg_kmem_charge_memcg+0x71/0xf0 [ 608.901309][T25952] ? memcg_kmem_put_cache+0x50/0x50 [ 608.906500][T25952] __memcg_kmem_charge+0x13a/0x3a0 [ 608.911598][T25952] __alloc_pages_nodemask+0x4f7/0x900 [ 608.916959][T25952] ? __alloc_pages_slowpath+0x2540/0x2540 [ 608.922850][T25952] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 608.928307][T25952] ? find_held_lock+0x35/0x130 [ 608.933055][T25952] ? mmu_notifier_invalidate_range_start+0x95/0x110 [ 608.939674][T25952] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 608.945901][T25952] alloc_pages_current+0x107/0x210 [ 608.951022][T25952] pte_alloc_one+0x1b/0x1a0 [ 608.955511][T25952] copy_huge_pmd+0x75/0x620 [ 608.960002][T25952] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 608.966262][T25952] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 608.972491][T25952] copy_page_range+0x775/0x1ed0 [ 608.977347][T25952] ? lockdep_hardirqs_on+0x418/0x5d0 [ 608.982640][T25952] ? pmd_alloc+0x180/0x180 [ 608.987043][T25952] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 608.992747][T25952] ? vma_compute_subtree_gap+0x158/0x230 [ 608.998628][T25952] ? validate_mm_rb+0xa3/0xc0 [ 609.003289][T25952] ? __vma_link_rb+0x5ad/0x770 [ 609.008057][T25952] dup_mm+0xa67/0x1430 [ 609.012127][T25952] ? vm_area_dup+0x170/0x170 [ 609.016702][T25952] ? debug_mutex_init+0x2d/0x60 [ 609.021544][T25952] copy_process+0x2671/0x6830 [ 609.026209][T25952] ? debug_smp_processor_id+0x3c/0x214 [ 609.031661][T25952] ? __cleanup_sighand+0x60/0x60 [ 609.036583][T25952] ? __might_fault+0x12b/0x1e0 [ 609.041433][T25952] ? __might_fault+0x12b/0x1e0 [ 609.046278][T25952] _do_fork+0x146/0xfa0 [ 609.050426][T25952] ? copy_init_mm+0x20/0x20 [ 609.054919][T25952] ? __kasan_check_read+0x11/0x20 [ 609.059926][T25952] ? _copy_to_user+0x118/0x160 [ 609.064681][T25952] __x64_sys_clone+0x1ab/0x270 [ 609.069442][T25952] ? __ia32_sys_vfork+0xd0/0xd0 [ 609.074296][T25952] ? do_syscall_64+0x26/0x760 [ 609.078967][T25952] ? lockdep_hardirqs_on+0x418/0x5d0 [ 609.084251][T25952] ? trace_hardirqs_on+0x67/0x240 [ 609.089264][T25952] do_syscall_64+0xfa/0x760 [ 609.093759][T25952] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 609.099636][T25952] RIP: 0033:0x459879 [ 609.103525][T25952] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 609.123128][T25952] RSP: 002b:00007f25ca07ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 609.131527][T25952] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000459879 [ 609.139481][T25952] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 609.147436][T25952] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 609.155391][T25952] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25ca07f6d4 [ 609.163345][T25952] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 00000000ffffffff [ 609.177614][T25952] memory: usage 307200kB, limit 307200kB, failcnt 561 [ 609.189322][T25952] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 609.226180][T25952] Memory cgroup stats for /syz2: [ 609.226969][T25952] anon 280543232 [ 609.226969][T25952] file 53248 [ 609.226969][T25952] kernel_stack 4718592 [ 609.226969][T25952] slab 8953856 [ 609.226969][T25952] sock 0 [ 609.226969][T25952] shmem 0 [ 609.226969][T25952] file_mapped 0 [ 609.226969][T25952] file_dirty 0 [ 609.226969][T25952] file_writeback 0 [ 609.226969][T25952] anon_thp 264241152 [ 609.226969][T25952] inactive_anon 0 [ 609.226969][T25952] active_anon 280543232 [ 609.226969][T25952] inactive_file 135168 22:55:16 executing program 5: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) 22:55:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 609.226969][T25952] active_file 16384 [ 609.226969][T25952] unevictable 0 [ 609.226969][T25952] slab_reclaimable 1622016 [ 609.226969][T25952] slab_unreclaimable 7331840 [ 609.226969][T25952] pgfault 48840 [ 609.226969][T25952] pgmajfault 0 [ 609.226969][T25952] workingset_refault 99 [ 609.226969][T25952] workingset_activate 0 [ 609.226969][T25952] workingset_nodereclaim 0 [ 609.226969][T25952] pgrefill 515 [ 609.226969][T25952] pgscan 514 [ 609.226969][T25952] pgsteal 238 22:55:16 executing program 3: setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 609.343322][T25952] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=21913,uid=0 [ 609.362366][T25952] Memory cgroup out of memory: Killed process 21913 (syz-executor.2) total-vm:72708kB, anon-rss:2204kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 609.386173][ T1064] oom_reaper: reaped process 21913 (syz-executor.2), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB 22:55:16 executing program 3: setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:17 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x0, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:55:17 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r1, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r2 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r3 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r3, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r1, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000840)=0x0) getpgid(r4) r5 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r2, 0x0) r6 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r6) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r1, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r0, 0x400000) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:55:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:17 executing program 3: setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r0, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:17 executing program 5: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) 22:55:17 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:17 executing program 3: setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r0, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 610.332655][T25993] debugfs: File 'dropped' in directory 'loop0' already present! [ 610.352518][T25993] debugfs: File 'msg' in directory 'loop0' already present! [ 610.375494][T25993] debugfs: File 'trace0' in directory 'loop0' already present! 22:55:17 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r1, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r2 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r3 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r3, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r1, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000840)=0x0) getpgid(r4) r5 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r2, 0x0) r6 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r6) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r1, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r0, 0x400000) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:55:17 executing program 5: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) 22:55:17 executing program 3: setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r0, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 610.843958][T26014] debugfs: File 'dropped' in directory 'loop0' already present! [ 610.872200][T26014] debugfs: File 'msg' in directory 'loop0' already present! [ 610.915193][T26014] debugfs: File 'trace0' in directory 'loop0' already present! 22:55:18 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(0xffffffffffffffff, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:55:18 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:18 executing program 5: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) 22:55:18 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:18 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r1, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r2 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r3 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r3, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r1, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000840)=0x0) getpgid(r4) r5 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r2, 0x0) r6 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r6) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r1, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r0, 0x400000) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000640)=0x152) 22:55:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 611.462779][T26043] debugfs: File 'dropped' in directory 'loop0' already present! [ 611.480947][T26043] debugfs: File 'msg' in directory 'loop0' already present! [ 611.502215][T26043] debugfs: File 'trace0' in directory 'loop0' already present! 22:55:18 executing program 5: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) socket(0x40000000002, 0x3, 0x2) mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) 22:55:18 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:18 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, 0x0, &(0x7f0000000640)) 22:55:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 612.020975][T26068] debugfs: File 'dropped' in directory 'loop0' already present! 22:55:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 612.069850][T26068] debugfs: File 'msg' in directory 'loop0' already present! [ 612.148064][T26068] debugfs: File 'trace0' in directory 'loop0' already present! 22:55:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:19 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:19 executing program 5: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) 22:55:19 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(0xffffffffffffffff, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:55:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, 0x0, &(0x7f0000000640)) 22:55:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:19 executing program 5: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) [ 612.680667][T26088] debugfs: File 'dropped' in directory 'loop0' already present! [ 612.695497][T26088] debugfs: File 'msg' in directory 'loop0' already present! [ 612.727486][T26088] debugfs: File 'trace0' in directory 'loop0' already present! 22:55:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, 0x0, &(0x7f0000000640)) 22:55:20 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:20 executing program 5: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xa79d, 0x8b, 0x6, 0x0, 0x0, 0x80, 0x9c527e37a171883c, 0xb, 0xb, 0x7ff, 0x1, 0x80000000, 0x80000000, 0x3, 0x1, 0xffff, 0x4, 0x96a7, 0xff, 0x100000000, 0x8001, 0x5, 0x200, 0x5, 0x10001, 0x6, 0x7, 0xcdb, 0x10000, 0xbc, 0x4, 0xfeb4, 0xfffffffffffffff7, 0x0, 0x1f, 0x2, 0x0, 0x80000001, 0x0, @perf_config_ext={0x9, 0x3}, 0x2, 0x3ff, 0x400, 0x0, 0xf5, 0x4, 0x7}, 0x0, 0x9, 0xffffffffffffffff, 0xa) mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) 22:55:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:20 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:20 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(0xffffffffffffffff, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) 22:55:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), 0x0) 22:55:20 executing program 5: connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) 22:55:20 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:21 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), 0x0) 22:55:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:21 executing program 5: connect$unix(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) [ 614.486888][T26159] debugfs: File 'dropped' in directory 'loop0' already present! [ 614.517606][T26159] debugfs: File 'msg' in directory 'loop0' already present! 22:55:21 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:21 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, 0x0) [ 614.597884][T26159] debugfs: File 'trace0' in directory 'loop0' already present! 22:55:21 executing program 5: mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) 22:55:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:22 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(r2, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x0) rmdir(&(0x7f0000000480)='./file1\x00') stat(&(0x7f0000000500)='./file1\x00', 0x0) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000840)=0x0) getpgid(r5) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) r7 = request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='kfyring&-\x00', 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000ac0)="31dd4716685defc91faf1b23c88eda517a62f85a360a5d947e75bb898f3e44e1c6fdd147162406b0cf9cfce97e6d223d52b02bc57ef9ce3a68cb44d820614f5434374e722a8244916e6d2a8a7c568d3e101d6da45a23b07f4036cccc437625f7d6396d8c1208aa01cdbfd75389c41f014df1bb910a6581e2406ed1e0733d5c411972231947f0885ede1093b24e760e782d0b96a36a106dc17fb58c39fe4e691cccf756316e58ac379f8a394953412716246c5c7a00cd8323cf42a5e5be20d2b0ebdaa554baa2c6d189a7ac03e9d80c6d6fc7cbdee992e85880abb0a5a522d3ff341c60e1861fb4", 0xe7}], 0x1, r7) io_setup(0xfe, &(0x7f0000000200)) memfd_create(&(0x7f0000000900)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\xe9\xe7\xac\"\xed\x96F\xec\xdcd\xcan6\x1d\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89', 0x3) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000280)=0x2, 0x4) socket$inet(0x2, 0x7, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x3aa, 0x4000000, 0x0, 0xfea3) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="f500", 0x10) syz_open_pts(r1, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000540), 0x0) 22:55:22 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:22 executing program 5: mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) 22:55:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 615.222385][T26189] debugfs: File 'dropped' in directory 'loop0' already present! [ 615.231390][T26189] debugfs: File 'msg' in directory 'loop0' already present! [ 615.260733][T26189] debugfs: File 'trace0' in directory 'loop0' already present! 22:55:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:22 executing program 5: mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) 22:55:22 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:22 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, 0x0) 22:55:22 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000b40)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$UI_SET_EVBIT(r0, 0x4008556c, 0x0) 22:55:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:22 executing program 5: mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x1000000) [ 615.680748][T26213] input: syz1 as /devices/virtual/input/input13 22:55:22 executing program 5: mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x10, 0xffffffffffffffff, 0x1000000) 22:55:22 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:23 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000b40)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$UI_SET_EVBIT(r0, 0x4004556d, 0x0) 22:55:23 executing program 5: mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x10, 0xffffffffffffffff, 0x1000000) 22:55:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 616.026446][T26236] input: syz1 as /devices/virtual/input/input14 22:55:23 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:23 executing program 2: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, 0x0) 22:55:23 executing program 4: syslog(0x4, &(0x7f00000006c0)=""/4096, 0x1000) 22:55:23 executing program 5: mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x10, 0xffffffffffffffff, 0x1000000) 22:55:23 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:23 executing program 5: mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x0) 22:55:23 executing program 4: 22:55:23 executing program 5: 22:55:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:23 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:24 executing program 5: [ 617.033568][T26263] syz-executor.2 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 617.066255][T26263] CPU: 0 PID: 26263 Comm: syz-executor.2 Not tainted 5.3.0-rc6-next-20190830 #75 [ 617.075412][T26263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 617.085828][T26263] Call Trace: [ 617.089243][T26263] dump_stack+0x172/0x1f0 [ 617.093601][T26263] dump_header+0x177/0x1152 [ 617.098139][T26263] ? pagefault_out_of_memory+0x11c/0x11c [ 617.103794][T26263] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 617.109615][T26263] ? ___ratelimit+0x60/0x595 [ 617.114243][T26263] ? do_raw_spin_unlock+0x57/0x270 [ 617.119373][T26263] oom_kill_process.cold+0x10/0x15 [ 617.124510][T26263] out_of_memory+0x334/0x1340 [ 617.129210][T26263] ? lock_downgrade+0x920/0x920 [ 617.134078][T26263] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 617.139884][T26263] ? oom_killer_disable+0x280/0x280 [ 617.145094][T26263] mem_cgroup_out_of_memory+0x1d8/0x240 [ 617.150754][T26263] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 617.150775][T26263] ? do_raw_spin_unlock+0x57/0x270 [ 617.150791][T26263] ? _raw_spin_unlock+0x2d/0x50 [ 617.150809][T26263] try_charge+0xf4b/0x1440 [ 617.150832][T26263] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 617.150852][T26263] ? find_held_lock+0x35/0x130 [ 617.161601][T26263] ? get_mem_cgroup_from_mm+0x139/0x320 [ 617.171011][T26263] ? lock_downgrade+0x920/0x920 [ 617.181302][T26263] ? percpu_ref_tryget_live+0x111/0x290 [ 617.191686][T26263] __memcg_kmem_charge_memcg+0x71/0xf0 [ 617.202667][T26263] ? memcg_kmem_put_cache+0x50/0x50 [ 617.207863][T26263] ? get_mem_cgroup_from_mm+0x156/0x320 [ 617.207882][T26263] __memcg_kmem_charge+0x13a/0x3a0 [ 617.207901][T26263] __alloc_pages_nodemask+0x4f7/0x900 [ 617.207914][T26263] ? __lockdep_free_key_range+0x120/0x120 [ 617.207931][T26263] ? __alloc_pages_slowpath+0x2540/0x2540 [ 617.218553][T26263] ? copy_page_range+0xef4/0x1ed0 [ 617.218573][T26263] ? copy_page_range+0xef4/0x1ed0 [ 617.218594][T26263] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 617.218614][T26263] alloc_pages_current+0x107/0x210 [ 617.256725][T26263] pte_alloc_one+0x1b/0x1a0 [ 617.261245][T26263] __pte_alloc+0x20/0x310 [ 617.265580][T26263] copy_page_range+0x14da/0x1ed0 [ 617.270512][T26263] ? retint_kernel+0x2b/0x2b [ 617.270530][T26263] ? trace_hardirqs_on_caller+0x6a/0x240 [ 617.280736][T26263] ? pmd_alloc+0x180/0x180 [ 617.280751][T26263] ? __rb_insert_augmented+0x20c/0xd90 [ 617.280766][T26263] ? validate_mm_rb+0xa3/0xc0 [ 617.280786][T26263] ? __vma_link_rb+0x5ad/0x770 [ 617.290626][T26263] dup_mm+0xa67/0x1430 [ 617.304126][T26263] ? vm_area_dup+0x170/0x170 [ 617.308720][T26263] ? debug_mutex_init+0x2d/0x60 [ 617.313586][T26263] copy_process+0x2671/0x6830 [ 617.318289][T26263] ? debug_smp_processor_id+0x3c/0x214 [ 617.323779][T26263] ? __cleanup_sighand+0x60/0x60 [ 617.328752][T26263] ? __might_fault+0x12b/0x1e0 22:55:24 executing program 4: [ 617.328769][T26263] ? __might_fault+0x12b/0x1e0 [ 617.328793][T26263] _do_fork+0x146/0xfa0 [ 617.328811][T26263] ? copy_init_mm+0x20/0x20 [ 617.328833][T26263] ? __kasan_check_read+0x11/0x20 [ 617.338330][T26263] ? _copy_to_user+0x118/0x160 [ 617.338357][T26263] __x64_sys_clone+0x1ab/0x270 [ 617.338374][T26263] ? __ia32_sys_vfork+0xd0/0xd0 [ 617.338398][T26263] ? do_syscall_64+0x26/0x760 [ 617.371610][T26263] ? lockdep_hardirqs_on+0x418/0x5d0 [ 617.376914][T26263] ? trace_hardirqs_on+0x67/0x240 [ 617.381963][T26263] do_syscall_64+0xfa/0x760 [ 617.386495][T26263] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 617.392402][T26263] RIP: 0033:0x459879 [ 617.396315][T26263] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 617.416048][T26263] RSP: 002b:00007f25ca07ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 617.424484][T26263] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000459879 [ 617.432439][T26263] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 617.440415][T26263] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 617.448369][T26263] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25ca07f6d4 [ 617.456408][T26263] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 00000000ffffffff [ 617.470608][T26263] memory: usage 307200kB, limit 307200kB, failcnt 597 [ 617.485970][T26263] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 617.493004][T26263] Memory cgroup stats for /syz2: [ 617.493693][T26263] anon 279179264 [ 617.493693][T26263] file 53248 [ 617.493693][T26263] kernel_stack 4915200 [ 617.493693][T26263] slab 9228288 [ 617.493693][T26263] sock 0 [ 617.493693][T26263] shmem 0 [ 617.493693][T26263] file_mapped 0 [ 617.493693][T26263] file_dirty 0 [ 617.493693][T26263] file_writeback 0 [ 617.493693][T26263] anon_thp 262144000 [ 617.493693][T26263] inactive_anon 0 [ 617.493693][T26263] active_anon 279179264 [ 617.493693][T26263] inactive_file 0 [ 617.493693][T26263] active_file 16384 [ 617.493693][T26263] unevictable 0 [ 617.493693][T26263] slab_reclaimable 1622016 [ 617.493693][T26263] slab_unreclaimable 7606272 [ 617.493693][T26263] pgfault 49566 [ 617.493693][T26263] pgmajfault 0 [ 617.493693][T26263] workingset_refault 99 [ 617.493693][T26263] workingset_activate 0 [ 617.493693][T26263] workingset_nodereclaim 0 [ 617.493693][T26263] pgrefill 515 [ 617.493693][T26263] pgscan 547 [ 617.493693][T26263] pgsteal 238 [ 617.493693][T26263] pgactivate 297 [ 617.696579][T26263] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=25972,uid=0 [ 617.715290][T26263] Memory cgroup out of memory: Killed process 25972 (syz-executor.2) total-vm:72576kB, anon-rss:2196kB, file-rss:34944kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 617.736791][ T1064] oom_reaper: reaped process 25972 (syz-executor.2), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB 22:55:25 executing program 5: 22:55:25 executing program 4: 22:55:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:25 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:25 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:25 executing program 2: 22:55:25 executing program 4: 22:55:25 executing program 5: 22:55:25 executing program 2: 22:55:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:25 executing program 4: 22:55:25 executing program 5: 22:55:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:25 executing program 2: creat(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x1100100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="66643d6fd2ea4a00b80fbd", @ANYBLOB]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) 22:55:25 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000001940)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_S390_VCPU_FAULT(0xffffffffffffffff, 0x4004ae52, &(0x7f0000000000)=0x9) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000300)={{}, {}, {0x0, 0x0, 0x0, 0x8b, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {}, {}, {}, 0xfffffffffffffffa}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 618.877592][T26317] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 618.989400][T26317] CPU: 1 PID: 26317 Comm: syz-executor.2 Not tainted 5.3.0-rc6-next-20190830 #75 [ 618.998571][T26317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 619.005333][T26323] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 619.008628][T26317] Call Trace: [ 619.008651][T26317] dump_stack+0x172/0x1f0 [ 619.008671][T26317] dump_header+0x177/0x1152 [ 619.008687][T26317] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 619.008705][T26317] ? ___ratelimit+0x2c8/0x595 [ 619.019641][T26317] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 619.028446][T26317] ? lockdep_hardirqs_on+0x418/0x5d0 [ 619.028462][T26317] ? trace_hardirqs_on+0x67/0x240 [ 619.028480][T26317] ? pagefault_out_of_memory+0x11c/0x11c [ 619.038931][T26317] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 619.038946][T26317] ? ___ratelimit+0x60/0x595 [ 619.038957][T26317] ? do_raw_spin_unlock+0x57/0x270 [ 619.038975][T26317] oom_kill_process.cold+0x10/0x15 [ 619.038993][T26317] out_of_memory+0x334/0x1340 [ 619.085863][T26317] ? lock_downgrade+0x920/0x920 [ 619.090706][T26317] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 619.096496][T26317] ? oom_killer_disable+0x280/0x280 [ 619.101706][T26317] mem_cgroup_out_of_memory+0x1d8/0x240 [ 619.107237][T26317] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 619.112854][T26317] ? do_raw_spin_unlock+0x57/0x270 [ 619.117954][T26317] ? _raw_spin_unlock+0x2d/0x50 [ 619.122793][T26317] try_charge+0xf4b/0x1440 [ 619.127200][T26317] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 619.132727][T26317] ? percpu_ref_tryget_live+0x111/0x290 [ 619.138257][T26317] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 619.144489][T26317] ? __kasan_check_read+0x11/0x20 [ 619.149509][T26317] ? get_mem_cgroup_from_mm+0x156/0x320 [ 619.155039][T26317] mem_cgroup_try_charge+0x136/0x590 [ 619.160338][T26317] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 619.166567][T26317] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 619.172211][T26317] __handle_mm_fault+0x1e34/0x3f20 [ 619.177335][T26317] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 619.182918][T26317] ? __kasan_check_read+0x11/0x20 [ 619.187949][T26317] handle_mm_fault+0x1b5/0x6c0 [ 619.192706][T26317] __do_page_fault+0x536/0xdd0 [ 619.197461][T26317] do_page_fault+0x38/0x590 [ 619.201952][T26317] page_fault+0x39/0x40 [ 619.206100][T26317] RIP: 0033:0x4111bf [ 619.209980][T26317] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 619.229566][T26317] RSP: 002b:00007ffdd342e220 EFLAGS: 00010206 [ 619.235623][T26317] RAX: 00007f25ca03e000 RBX: 0000000000020000 RCX: 00000000004598ca [ 619.243578][T26317] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 619.251532][T26317] RBP: 00007ffdd342e300 R08: ffffffffffffffff R09: 0000000000000000 [ 619.263947][T26317] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffdd342e3f0 [ 619.272028][T26317] R13: 00007f25ca05e700 R14: 0000000000000001 R15: 000000000075bfd4 22:55:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:26 executing program 4: syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500), 0xc, 0x0, 0x0, 0x0, 0x1b3}, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000440)={[0x0, 0x0, 0x7, 0x3, 0x0, 0x1, 0x0, 0xc9, 0x0, 0x401, 0x7], 0x10000}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYRES16=0x0, @ANYBLOB='%&'], 0x2}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:55:26 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 619.322144][T26317] memory: usage 307200kB, limit 307200kB, failcnt 621 [ 619.416044][T26317] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 619.423090][T26317] Memory cgroup stats for /syz2: [ 619.423196][T26317] anon 279134208 [ 619.423196][T26317] file 53248 [ 619.423196][T26317] kernel_stack 4915200 [ 619.423196][T26317] slab 9367552 [ 619.423196][T26317] sock 0 [ 619.423196][T26317] shmem 0 [ 619.423196][T26317] file_mapped 0 [ 619.423196][T26317] file_dirty 0 [ 619.423196][T26317] file_writeback 0 [ 619.423196][T26317] anon_thp 262144000 [ 619.423196][T26317] inactive_anon 0 [ 619.423196][T26317] active_anon 279134208 [ 619.423196][T26317] inactive_file 0 [ 619.423196][T26317] active_file 16384 [ 619.423196][T26317] unevictable 0 [ 619.423196][T26317] slab_reclaimable 1622016 [ 619.423196][T26317] slab_unreclaimable 7745536 [ 619.423196][T26317] pgfault 49731 [ 619.423196][T26317] pgmajfault 0 [ 619.423196][T26317] workingset_refault 99 [ 619.423196][T26317] workingset_activate 0 [ 619.423196][T26317] workingset_nodereclaim 0 [ 619.423196][T26317] pgrefill 515 [ 619.423196][T26317] pgscan 547 [ 619.423196][T26317] pgsteal 238 [ 619.423196][T26317] pgactivate 297 [ 619.527105][T26317] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=25442,uid=0 [ 619.542929][T26317] Memory cgroup out of memory: Killed process 25442 (syz-executor.2) total-vm:72576kB, anon-rss:2196kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 22:55:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 619.563055][ T1064] oom_reaper: reaped process 25442 (syz-executor.2), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 619.580357][T26318] syz-executor.2 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=0, oom_score_adj=1000 [ 619.692941][T26318] CPU: 1 PID: 26318 Comm: syz-executor.2 Not tainted 5.3.0-rc6-next-20190830 #75 [ 619.703590][T26318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 619.713642][T26318] Call Trace: [ 619.716927][T26318] dump_stack+0x172/0x1f0 [ 619.721264][T26318] dump_header+0x177/0x1152 [ 619.725754][T26318] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 619.731542][T26318] ? ___ratelimit+0x2c8/0x595 [ 619.736204][T26318] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 619.742000][T26318] ? lockdep_hardirqs_on+0x418/0x5d0 [ 619.747272][T26318] ? trace_hardirqs_on+0x67/0x240 [ 619.752287][T26318] ? pagefault_out_of_memory+0x11c/0x11c [ 619.757916][T26318] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 619.763706][T26318] ? ___ratelimit+0x60/0x595 [ 619.768281][T26318] ? do_raw_spin_unlock+0x57/0x270 [ 619.773392][T26318] oom_kill_process.cold+0x10/0x15 [ 619.778491][T26318] out_of_memory+0x334/0x1340 [ 619.783151][T26318] ? lock_downgrade+0x920/0x920 [ 619.788000][T26318] ? oom_killer_disable+0x280/0x280 [ 619.793195][T26318] mem_cgroup_out_of_memory+0x1d8/0x240 [ 619.798725][T26318] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 619.804348][T26318] ? do_raw_spin_unlock+0x57/0x270 [ 619.809456][T26318] ? _raw_spin_unlock+0x2d/0x50 [ 619.814328][T26318] try_charge+0xa2d/0x1440 [ 619.818752][T26318] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 619.824282][T26318] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 619.830248][T26318] ? cache_grow_begin+0x122/0xd20 [ 619.835257][T26318] ? find_held_lock+0x35/0x130 [ 619.840004][T26318] ? cache_grow_begin+0x122/0xd20 [ 619.845020][T26318] __memcg_kmem_charge_memcg+0x71/0xf0 [ 619.850467][T26318] ? memcg_kmem_put_cache+0x50/0x50 [ 619.855650][T26318] ? __kasan_check_read+0x11/0x20 [ 619.860660][T26318] cache_grow_begin+0x629/0xd20 [ 619.865502][T26318] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 619.871652][T26318] ? mempolicy_slab_node+0x139/0x390 [ 619.876927][T26318] fallback_alloc+0x1fd/0x2d0 [ 619.881593][T26318] ____cache_alloc_node+0x1bc/0x1d0 [ 619.886775][T26318] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 619.893016][T26318] kmem_cache_alloc_node_trace+0xec/0x750 [ 619.898723][T26318] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 619.904697][T26318] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 619.910495][T26318] __kmalloc_node+0x3d/0x70 [ 619.914999][T26318] kvmalloc_node+0x68/0x100 [ 619.919589][T26318] alloc_fdtable+0xd6/0x290 [ 619.924078][T26318] dup_fd+0x782/0xb70 [ 619.928073][T26318] copy_process+0x1b8a/0x6830 [ 619.932745][T26318] ? debug_smp_processor_id+0x3c/0x214 [ 619.938202][T26318] ? __cleanup_sighand+0x60/0x60 [ 619.943132][T26318] ? __might_fault+0x12b/0x1e0 [ 619.947884][T26318] ? __might_fault+0x12b/0x1e0 [ 619.952644][T26318] _do_fork+0x146/0xfa0 [ 619.956802][T26318] ? copy_init_mm+0x20/0x20 [ 619.961295][T26318] ? __kasan_check_read+0x11/0x20 [ 619.966305][T26318] ? _copy_to_user+0x118/0x160 [ 619.971071][T26318] __x64_sys_clone+0x1ab/0x270 [ 619.975851][T26318] ? __ia32_sys_vfork+0xd0/0xd0 [ 619.980696][T26318] ? do_syscall_64+0x26/0x760 [ 619.985357][T26318] ? lockdep_hardirqs_on+0x418/0x5d0 [ 619.990630][T26318] ? trace_hardirqs_on+0x67/0x240 [ 619.995777][T26318] do_syscall_64+0xfa/0x760 [ 620.000289][T26318] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 620.006169][T26318] RIP: 0033:0x459879 [ 620.010054][T26318] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 620.029658][T26318] RSP: 002b:00007f25ca07ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 620.038060][T26318] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000459879 [ 620.046068][T26318] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 620.054036][T26318] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 620.061992][T26318] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25ca07f6d4 [ 620.069946][T26318] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 00000000ffffffff 22:55:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:27 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 620.221425][T26318] memory: usage 305260kB, limit 307200kB, failcnt 621 [ 620.241049][T26318] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 620.258466][T26318] Memory cgroup stats for /syz2: [ 620.258589][T26318] anon 277020672 [ 620.258589][T26318] file 53248 [ 620.258589][T26318] kernel_stack 4915200 [ 620.258589][T26318] slab 9367552 [ 620.258589][T26318] sock 0 [ 620.258589][T26318] shmem 0 [ 620.258589][T26318] file_mapped 0 [ 620.258589][T26318] file_dirty 0 [ 620.258589][T26318] file_writeback 0 [ 620.258589][T26318] anon_thp 260046848 [ 620.258589][T26318] inactive_anon 0 [ 620.258589][T26318] active_anon 277020672 [ 620.258589][T26318] inactive_file 0 [ 620.258589][T26318] active_file 16384 [ 620.258589][T26318] unevictable 0 [ 620.258589][T26318] slab_reclaimable 1622016 [ 620.258589][T26318] slab_unreclaimable 7745536 [ 620.258589][T26318] pgfault 49764 [ 620.258589][T26318] pgmajfault 0 [ 620.258589][T26318] workingset_refault 99 [ 620.258589][T26318] workingset_activate 0 [ 620.258589][T26318] workingset_nodereclaim 0 [ 620.258589][T26318] pgrefill 515 [ 620.258589][T26318] pgscan 547 [ 620.258589][T26318] pgsteal 238 [ 620.258589][T26318] pgactivate 297 22:55:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54db", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 620.373514][T26318] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=25390,uid=0 22:55:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 620.408441][T26318] Memory cgroup out of memory: Killed process 25390 (syz-executor.2) total-vm:72576kB, anon-rss:2196kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 22:55:27 executing program 2: syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500), 0xc, 0x0, 0x0, 0x0, 0x1b3}, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000440)={[0x0, 0x0, 0x7, 0x3, 0x0, 0x1, 0x0, 0xc9, 0x0, 0x401, 0x7], 0x10000}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYRES16=0x0, @ANYBLOB='5'], 0x2}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 620.526150][ T1064] oom_reaper: reaped process 25390 (syz-executor.2), now anon-rss:0kB, file-rss:34688kB, shmem-rss:0kB [ 620.538345][T26323] syz-executor.5 invoked oom-killer: gfp_mask=0x40cd0(GFP_KERNEL|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=1000 [ 620.603364][T26323] CPU: 0 PID: 26323 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 620.612516][T26323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 620.622590][T26323] Call Trace: [ 620.622686][T26323] dump_stack+0x172/0x1f0 [ 620.622707][T26323] dump_header+0x177/0x1152 [ 620.622725][T26323] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 620.622737][T26323] ? ___ratelimit+0x2c8/0x595 [ 620.622752][T26323] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 22:55:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54db", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 620.622781][T26323] ? lockdep_hardirqs_on+0x418/0x5d0 [ 620.630372][T26323] ? trace_hardirqs_on+0x67/0x240 [ 620.630391][T26323] ? pagefault_out_of_memory+0x11c/0x11c [ 620.630407][T26323] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 620.630424][T26323] ? ___ratelimit+0x60/0x595 [ 620.645375][T26323] ? do_raw_spin_unlock+0x57/0x270 [ 620.645399][T26323] oom_kill_process.cold+0x10/0x15 [ 620.645416][T26323] out_of_memory+0x334/0x1340 [ 620.645435][T26323] ? lock_downgrade+0x920/0x920 [ 620.661518][T26323] ? oom_killer_disable+0x280/0x280 [ 620.672983][T26323] mem_cgroup_out_of_memory+0x1d8/0x240 [ 620.673003][T26323] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 620.683642][T26323] ? do_raw_spin_unlock+0x57/0x270 [ 620.683663][T26323] ? _raw_spin_unlock+0x2d/0x50 [ 620.683690][T26323] try_charge+0xf4b/0x1440 [ 620.709452][T26323] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 620.709470][T26323] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 620.709488][T26323] ? cache_grow_begin+0x122/0xd20 [ 620.709503][T26323] ? find_held_lock+0x35/0x130 [ 620.709520][T26323] ? cache_grow_begin+0x122/0xd20 [ 620.755715][T26323] __memcg_kmem_charge_memcg+0x71/0xf0 [ 620.761161][T26323] ? memcg_kmem_put_cache+0x50/0x50 [ 620.766345][T26323] ? __kasan_check_read+0x11/0x20 [ 620.771375][T26323] cache_grow_begin+0x629/0xd20 [ 620.776222][T26323] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 620.781924][T26323] ? mempolicy_slab_node+0x139/0x390 [ 620.787209][T26323] fallback_alloc+0x1fd/0x2d0 [ 620.791898][T26323] ____cache_alloc_node+0x1bc/0x1d0 [ 620.797107][T26323] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 620.803347][T26323] kmem_cache_alloc+0x1ef/0x710 [ 620.808195][T26323] alloc_inode+0x16f/0x1e0 [ 620.812600][T26323] new_inode_pseudo+0x19/0xf0 [ 620.817266][T26323] new_inode+0x1f/0x40 [ 620.821323][T26323] debugfs_get_inode+0x1a/0x130 [ 620.826167][T26323] __debugfs_create_file+0xb7/0x3f0 [ 620.831354][T26323] debugfs_create_file+0x5a/0x70 [ 620.836278][T26323] kvm_dev_ioctl+0xa04/0x1650 [ 620.840944][T26323] ? kvm_debugfs_release+0x90/0x90 [ 620.846045][T26323] ? kvm_debugfs_release+0x90/0x90 [ 620.851144][T26323] do_vfs_ioctl+0xdb6/0x13e0 [ 620.855724][T26323] ? ioctl_preallocate+0x210/0x210 [ 620.860820][T26323] ? __fget+0x384/0x560 [ 620.864966][T26323] ? ksys_dup3+0x3e0/0x3e0 [ 620.869375][T26323] ? nsecs_to_jiffies+0x30/0x30 [ 620.874374][T26323] ? tomoyo_file_ioctl+0x23/0x30 [ 620.879332][T26323] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 620.885568][T26323] ? security_file_ioctl+0x8d/0xc0 [ 620.890673][T26323] ksys_ioctl+0xab/0xd0 [ 620.894826][T26323] __x64_sys_ioctl+0x73/0xb0 [ 620.899405][T26323] do_syscall_64+0xfa/0x760 [ 620.903905][T26323] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 620.909792][T26323] RIP: 0033:0x459879 [ 620.913689][T26323] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 620.933279][T26323] RSP: 002b:00007f357f44ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 620.941676][T26323] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459879 [ 620.949637][T26323] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000004 [ 620.957592][T26323] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 620.965548][T26323] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f357f44f6d4 [ 620.973511][T26323] R13: 00000000004c2808 R14: 00000000004d5e48 R15: 00000000ffffffff [ 621.005743][T26323] memory: usage 307168kB, limit 307200kB, failcnt 4603 [ 621.013086][T26323] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 621.021103][T26323] Memory cgroup stats for /syz5: [ 621.021437][T26323] anon 276140032 [ 621.021437][T26323] file 65536 [ 621.021437][T26323] kernel_stack 4587520 [ 621.021437][T26323] slab 13373440 [ 621.021437][T26323] sock 380928 [ 621.021437][T26323] shmem 0 [ 621.021437][T26323] file_mapped 135168 [ 621.021437][T26323] file_dirty 0 [ 621.021437][T26323] file_writeback 0 [ 621.021437][T26323] anon_thp 260046848 [ 621.021437][T26323] inactive_anon 0 [ 621.021437][T26323] active_anon 276144128 [ 621.021437][T26323] inactive_file 0 [ 621.021437][T26323] active_file 49152 [ 621.021437][T26323] unevictable 0 [ 621.021437][T26323] slab_reclaimable 4730880 [ 621.021437][T26323] slab_unreclaimable 8642560 [ 621.021437][T26323] pgfault 60291 [ 621.021437][T26323] pgmajfault 33 [ 621.021437][T26323] workingset_refault 2904 [ 621.021437][T26323] workingset_activate 132 [ 621.021437][T26323] workingset_nodereclaim 0 [ 621.021437][T26323] pgrefill 2086 [ 621.021437][T26323] pgscan 15121 [ 621.021437][T26323] pgsteal 9845 [ 621.171871][T26323] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=23833,uid=0 [ 621.211636][T26323] Memory cgroup out of memory: Killed process 23833 (syz-executor.5) total-vm:72708kB, anon-rss:2216kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:147456kB oom_score_adj:1000 [ 621.288606][ T1064] oom_reaper: reaped process 23833 (syz-executor.5), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB 22:55:28 executing program 5: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, 0x0) 22:55:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54db", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:28 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:28 executing program 4: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ptrace$getenv(0x4201, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, 0x0) fcntl$setown(r0, 0x8, 0x0) 22:55:28 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:28 executing program 2: syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500), 0xc, 0x0, 0x0, 0x0, 0x1b3}, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000440)={[0x0, 0x0, 0x7, 0x3, 0x0, 0x1, 0x0, 0xc9, 0x0, 0x401, 0x7], 0x10000}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYRES16=0x0, @ANYBLOB='5'], 0x2}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:55:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:28 executing program 4: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, 0x0) 22:55:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:29 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:29 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:29 executing program 5: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x6, 0x1]}}) futimesat(r2, 0x0, 0x0) 22:55:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:29 executing program 2: syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500), 0xc, 0x0, 0x0, 0x0, 0x1b3}, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000440)={[0x0, 0x0, 0x7, 0x3, 0x0, 0x1, 0x0, 0xc9, 0x0, 0x401, 0x7], 0x10000}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYRES16=0x0, @ANYBLOB='5'], 0x2}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:55:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:30 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 623.068021][T26425] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 623.207816][T26425] CPU: 0 PID: 26425 Comm: syz-executor.2 Not tainted 5.3.0-rc6-next-20190830 #75 [ 623.216977][T26425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 623.227041][T26425] Call Trace: [ 623.230362][T26425] dump_stack+0x172/0x1f0 [ 623.234736][T26425] dump_header+0x177/0x1152 [ 623.239340][T26425] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 623.245150][T26425] ? ___ratelimit+0x2c8/0x595 [ 623.249843][T26425] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 623.255671][T26425] ? lockdep_hardirqs_on+0x418/0x5d0 [ 623.260964][T26425] ? trace_hardirqs_on+0x67/0x240 [ 623.265999][T26425] ? pagefault_out_of_memory+0x11c/0x11c [ 623.271652][T26425] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 623.277471][T26425] ? ___ratelimit+0x60/0x595 [ 623.282059][T26425] ? do_raw_spin_unlock+0x57/0x270 [ 623.287182][T26425] oom_kill_process.cold+0x10/0x15 [ 623.292309][T26425] out_of_memory+0x334/0x1340 [ 623.296999][T26425] ? lock_downgrade+0x920/0x920 [ 623.301855][T26425] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 623.307702][T26425] ? oom_killer_disable+0x280/0x280 [ 623.312924][T26425] mem_cgroup_out_of_memory+0x1d8/0x240 [ 623.318480][T26425] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 623.324118][T26425] ? do_raw_spin_unlock+0x57/0x270 [ 623.329235][T26425] ? _raw_spin_unlock+0x2d/0x50 [ 623.334100][T26425] try_charge+0xf4b/0x1440 [ 623.338533][T26425] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 623.344087][T26425] ? percpu_ref_tryget_live+0x111/0x290 [ 623.349646][T26425] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 623.355899][T26425] ? __kasan_check_read+0x11/0x20 [ 623.360935][T26425] ? get_mem_cgroup_from_mm+0x156/0x320 [ 623.366488][T26425] mem_cgroup_try_charge+0x136/0x590 [ 623.371779][T26425] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 623.378034][T26425] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 623.383690][T26425] __handle_mm_fault+0x1e34/0x3f20 [ 623.388825][T26425] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 623.394391][T26425] ? __kasan_check_read+0x11/0x20 [ 623.399441][T26425] handle_mm_fault+0x1b5/0x6c0 22:55:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 623.404225][T26425] __do_page_fault+0x536/0xdd0 [ 623.409006][T26425] do_page_fault+0x38/0x590 [ 623.413519][T26425] page_fault+0x39/0x40 [ 623.417677][T26425] RIP: 0033:0x4111bf [ 623.421571][T26425] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 623.441196][T26425] RSP: 002b:00007ffdd342e220 EFLAGS: 00010206 [ 623.441208][T26425] RAX: 00007f25ca01d000 RBX: 0000000000020000 RCX: 00000000004598ca 22:55:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:30 executing program 4: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x640) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) sched_getaffinity(r1, 0xfffffffffffffd85, &(0x7f0000000300)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b706964732018522cd8edb206f244f15457b87b0a79450934f28400a10c66240a367104977174122927efc2a09869c8a2ccacd61fd6072d577bf6950b96c02e40c7e10155dc87159ff5"], 0x6) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000700)={0xa, @vbi={0x5, 0x81c3, 0x80000001, 0x41416770, [0x6], [0x0, 0x1]}}) futimesat(r2, 0x0, &(0x7f00000006c0)={{}, {0x0, 0x7530}}) [ 623.441216][T26425] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 623.441223][T26425] RBP: 00007ffdd342e300 R08: ffffffffffffffff R09: 0000000000000000 [ 623.441232][T26425] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffdd342e3f0 [ 623.441241][T26425] R13: 00007f25ca03d700 R14: 0000000000000002 R15: 000000000075c07c [ 623.567937][T26425] memory: usage 307200kB, limit 307200kB, failcnt 668 [ 623.578476][T26425] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 623.585495][T26425] Memory cgroup stats for /syz2: [ 623.585698][T26425] anon 277118976 [ 623.585698][T26425] file 53248 [ 623.585698][T26425] kernel_stack 4980736 [ 623.585698][T26425] slab 11362304 [ 623.585698][T26425] sock 0 [ 623.585698][T26425] shmem 0 [ 623.585698][T26425] file_mapped 0 [ 623.585698][T26425] file_dirty 0 22:55:30 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 623.585698][T26425] file_writeback 0 [ 623.585698][T26425] anon_thp 260046848 [ 623.585698][T26425] inactive_anon 0 [ 623.585698][T26425] active_anon 277045248 [ 623.585698][T26425] inactive_file 0 [ 623.585698][T26425] active_file 16384 [ 623.585698][T26425] unevictable 0 [ 623.585698][T26425] slab_reclaimable 1757184 [ 623.585698][T26425] slab_unreclaimable 9605120 [ 623.585698][T26425] pgfault 50028 [ 623.585698][T26425] pgmajfault 0 [ 623.585698][T26425] workingset_refault 132 [ 623.585698][T26425] workingset_activate 0 22:55:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 623.585698][T26425] workingset_nodereclaim 0 [ 623.585698][T26425] pgrefill 548 [ 623.585698][T26425] pgscan 547 [ 623.585698][T26425] pgsteal 238 [ 623.585698][T26425] pgactivate 297 [ 623.846133][T26425] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=26425,uid=0 [ 624.046251][T26425] Memory cgroup out of memory: Killed process 26425 (syz-executor.2) total-vm:72840kB, anon-rss:2204kB, file-rss:35828kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 624.131349][ T1064] [ 624.133804][ T1064] ============================================ [ 624.139979][ T1064] WARNING: possible recursive locking detected [ 624.146135][ T1064] 5.3.0-rc6-next-20190830 #75 Not tainted [ 624.151898][ T1064] -------------------------------------------- [ 624.158059][ T1064] oom_reaper/1064 is trying to acquire lock: [ 624.164041][ T1064] ffffffff8904ff60 (mmu_notifier_invalidate_range_start){+.+.}, at: __mmu_notifier_invalidate_range_end+0x0/0x360 [ 624.176031][ T1064] [ 624.176031][ T1064] but task is already holding lock: [ 624.183400][ T1064] ffffffff8904ff60 (mmu_notifier_invalidate_range_start){+.+.}, at: __oom_reap_task_mm+0x196/0x490 [ 624.194097][ T1064] [ 624.194097][ T1064] other info that might help us debug this: [ 624.202170][ T1064] Possible unsafe locking scenario: [ 624.202170][ T1064] [ 624.209647][ T1064] CPU0 [ 624.212924][ T1064] ---- [ 624.216218][ T1064] lock(mmu_notifier_invalidate_range_start); [ 624.222368][ T1064] lock(mmu_notifier_invalidate_range_start); [ 624.228652][ T1064] [ 624.228652][ T1064] *** DEADLOCK *** [ 624.228652][ T1064] [ 624.236178][T26453] ieee80211 phy1471: Selected rate control algorithm 'minstrel_ht' [ 624.236803][ T1064] May be due to missing lock nesting notation [ 624.236803][ T1064] [ 624.247552][T26455] kobject: 'hwsim1473' (00000000ab87a1de): kobject_add_internal: parent: 'mac80211_hwsim', set: 'devices' [ 624.252994][ T1064] 2 locks held by oom_reaper/1064: [ 624.252998][ T1064] #0: ffff888060774e50 (&mm->mmap_sem#2){++++}, at: oom_reaper+0x3a7/0x1320 [ 624.253029][ T1064] #1: ffffffff8904ff60 (mmu_notifier_invalidate_range_start){+.+.}, at: __oom_reap_task_mm+0x196/0x490 [ 624.253057][ T1064] [ 624.253057][ T1064] stack backtrace: [ 624.265683][T26455] kobject: 'hwsim1473' (00000000ab87a1de): kobject_uevent_env [ 624.269434][ T1064] CPU: 1 PID: 1064 Comm: oom_reaper Not tainted 5.3.0-rc6-next-20190830 #75 [ 624.269441][ T1064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 624.269445][ T1064] Call Trace: [ 624.269463][ T1064] dump_stack+0x172/0x1f0 [ 624.269481][ T1064] __lock_acquire.cold+0x15d/0x385 [ 624.269498][ T1064] ? mark_held_locks+0xf0/0xf0 [ 624.269513][ T1064] ? unmap_page_range+0x1df4/0x2380 [ 624.269532][ T1064] lock_acquire+0x190/0x410 [ 624.295001][T26455] kobject: 'hwsim1473' (00000000ab87a1de): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1473' [ 624.295251][ T1064] ? __mmu_notifier_invalidate_range_start+0x210/0x210 [ 624.312896][ T3891] kobject: 'loop0' (00000000c5c9f182): kobject_uevent_env [ 624.321384][ T1064] __mmu_notifier_invalidate_range_end+0x3c/0x360 22:55:31 executing program 5: setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 624.321397][ T1064] ? __mmu_notifier_invalidate_range_start+0x210/0x210 [ 624.321417][ T1064] ? __mmu_notifier_invalidate_range_start+0x1a5/0x210 [ 624.331286][T26455] kobject: 'hwsim1473' (00000000ab87a1de): kobject_uevent_env [ 624.334096][ T1064] __oom_reap_task_mm+0x3fa/0x490 [ 624.334108][ T1064] ? process_shares_mm+0x130/0x130 [ 624.334126][ T1064] ? oom_reaper+0x3a7/0x1320 [ 624.339429][T26455] kobject: 'hwsim1473' (00000000ab87a1de): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1473' [ 624.344077][ T1064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 624.344096][ T1064] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 624.344113][ T1064] ? __kasan_check_read+0x11/0x20 [ 624.349207][ T3891] kobject: 'loop0' (00000000c5c9f182): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 624.360193][ T1064] ? do_raw_spin_unlock+0x57/0x270 [ 624.360206][ T1064] oom_reaper+0x2b2/0x1320 [ 624.360219][ T1064] ? __oom_reap_task_mm+0x490/0x490 [ 624.360231][ T1064] ? trace_hardirqs_on+0x67/0x240 [ 624.360241][ T1064] ? finish_wait+0x260/0x260 [ 624.360260][ T1064] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 624.367948][T26455] kobject: 'ieee80211' (00000000606f751e): kobject_add_internal: parent: 'hwsim1473', set: '(null)' [ 624.374200][ T1064] ? __kthread_parkme+0x108/0x1c0 [ 624.374212][ T1064] ? __kasan_check_read+0x11/0x20 [ 624.374225][ T1064] kthread+0x361/0x430 [ 624.374237][ T1064] ? __oom_reap_task_mm+0x490/0x490 [ 624.374254][ T1064] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 624.393635][T26455] kobject: 'phy1472' (000000008cd457c7): kobject_add_internal: parent: 'ieee80211', set: 'devices' [ 624.394352][ T1064] ret_from_fork+0x24/0x30 [ 624.407582][T26455] kobject: 'phy1472' (000000008cd457c7): kobject_uevent_env [ 624.427247][ T1064] oom_reaper: reaped process 26425 (syz-executor.2), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 624.434471][ T3891] kobject: 'loop4' (00000000c0d5415c): kobject_uevent_env [ 624.452295][T26425] kobject: 'kvm' (0000000074b76f20): kobject_uevent_env [ 624.471442][ T3891] kobject: 'loop4' (00000000c0d5415c): fill_kobj_path: path = '/devices/virtual/block/loop4' 22:55:31 executing program 2: syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500), 0xc, 0x0, 0x0, 0x0, 0x1b3}, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000440)={[0x0, 0x0, 0x7, 0x3, 0x0, 0x1, 0x0, 0xc9, 0x0, 0x401, 0x7], 0x10000}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYRES16=0x0, @ANYBLOB='5'], 0x2}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:55:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:31 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900), 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 624.492349][T26425] kobject: 'kvm' (0000000074b76f20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 624.508943][T26455] kobject: 'phy1472' (000000008cd457c7): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1473/ieee80211/phy1472' [ 624.629715][ T3891] kobject: 'loop3' (00000000eb3aada7): kobject_uevent_env [ 624.641546][ T3891] kobject: 'loop3' (00000000eb3aada7): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 624.655467][ T3891] kobject: 'loop5' (00000000429186e7): kobject_uevent_env [ 624.663790][ T3891] kobject: 'loop5' (00000000429186e7): fill_kobj_path: path = '/devices/virtual/block/loop5' 22:55:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900), 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 624.690263][ T3891] kobject: 'loop2' (000000006fa91856): kobject_uevent_env [ 624.712592][ T3891] kobject: 'loop2' (000000006fa91856): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 624.769898][ T3891] kobject: 'loop3' (00000000eb3aada7): kobject_uevent_env [ 624.799266][ T3891] kobject: 'loop3' (00000000eb3aada7): fill_kobj_path: path = '/devices/virtual/block/loop3' 22:55:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900), 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 624.861435][T26483] syz-executor.2 invoked oom-killer: gfp_mask=0x40cd0(GFP_KERNEL|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=1000 [ 624.906322][T26483] CPU: 1 PID: 26483 Comm: syz-executor.2 Not tainted 5.3.0-rc6-next-20190830 #75 [ 624.915471][T26483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 624.920150][ T3891] kobject: 'loop5' (00000000429186e7): kobject_uevent_env [ 624.925557][T26483] Call Trace: [ 624.936109][T26483] dump_stack+0x172/0x1f0 [ 624.940462][T26483] dump_header+0x177/0x1152 [ 624.943770][T26455] kobject: 'rfkill1474' (00000000d4d6da73): kobject_add_internal: parent: 'phy1472', set: 'devices' [ 624.944972][T26483] ? ___ratelimit+0xf8/0x595 [ 624.944993][T26483] ? trace_hardirqs_on+0x67/0x240 [ 624.960289][ T3891] kobject: 'loop5' (00000000429186e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 624.963957][T26455] kobject: 'rfkill1474' (00000000d4d6da73): kobject_uevent_env [ 624.965319][T26483] ? pagefault_out_of_memory+0x11c/0x11c [ 624.965336][T26483] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 624.965352][T26483] ? ___ratelimit+0x60/0x595 [ 624.975775][T26455] kobject: 'rfkill1474' (00000000d4d6da73): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1473/ieee80211/phy1472/rfkill1474' [ 624.983041][T26483] ? do_raw_spin_unlock+0x57/0x270 [ 624.983059][T26483] oom_kill_process.cold+0x10/0x15 [ 624.983075][T26483] out_of_memory+0x334/0x1340 [ 624.983089][T26483] ? lock_downgrade+0x920/0x920 [ 624.983116][T26483] ? oom_killer_disable+0x280/0x280 [ 625.002619][T26455] ieee80211 phy1472: Selected rate control algorithm 'minstrel_ht' [ 625.013448][T26483] ? __kasan_check_read+0x11/0x20 [ 625.013469][T26483] mem_cgroup_out_of_memory+0x1d8/0x240 [ 625.013481][T26483] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 625.013496][T26483] ? do_raw_spin_unlock+0x57/0x270 [ 625.013522][T26483] ? _raw_spin_unlock+0x2d/0x50 [ 625.055522][ T3891] kobject: 'loop1' (0000000038d50dcd): kobject_uevent_env [ 625.057274][T26483] try_charge+0xf4b/0x1440 [ 625.057295][T26483] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 625.062927][ T3891] kobject: 'loop1' (0000000038d50dcd): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 625.068004][T26483] ? cache_grow_begin+0x122/0xd20 [ 625.068015][T26483] ? __kasan_check_read+0x11/0x20 [ 625.068035][T26483] __memcg_kmem_charge_memcg+0x71/0xf0 [ 625.094034][T26492] kobject: 'hwsim1474' (000000001f71204b): kobject_add_internal: parent: 'mac80211_hwsim', set: 'devices' [ 625.100021][T26483] ? memcg_kmem_put_cache+0x50/0x50 [ 625.100033][T26483] ? cache_grow_begin+0x70b/0xd20 [ 625.100048][T26483] cache_grow_begin+0x629/0xd20 [ 625.100062][T26483] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 625.100082][T26483] ? mempolicy_slab_node+0x139/0x390 [ 625.117582][ T3891] kobject: 'loop5' (00000000429186e7): kobject_uevent_env [ 625.126810][T26483] fallback_alloc+0x1fd/0x2d0 [ 625.126827][T26483] ____cache_alloc_node+0x1bc/0x1d0 [ 625.126848][T26483] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 625.143799][T26492] kobject: 'hwsim1474' (000000001f71204b): kobject_uevent_env [ 625.147585][T26483] kmem_cache_alloc+0x1ef/0x710 [ 625.147606][T26483] alloc_inode+0x16f/0x1e0 [ 625.147620][T26483] new_inode_pseudo+0x19/0xf0 [ 625.147641][T26483] new_inode+0x1f/0x40 [ 625.158792][T26492] kobject: 'hwsim1474' (000000001f71204b): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1474' [ 625.160029][T26483] debugfs_get_inode+0x1a/0x130 [ 625.160045][T26483] __debugfs_create_file+0xb7/0x3f0 [ 625.160066][T26483] debugfs_create_file+0x5a/0x70 [ 625.172058][ T3891] kobject: 'loop5' (00000000429186e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 625.176170][T26483] kvm_dev_ioctl+0xa04/0x1650 [ 625.176187][T26483] ? kvm_debugfs_release+0x90/0x90 [ 625.176202][T26483] ? kvm_debugfs_release+0x90/0x90 [ 625.176220][T26483] do_vfs_ioctl+0xdb6/0x13e0 22:55:32 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) [ 625.188526][T26492] kobject: 'hwsim1474' (000000001f71204b): kobject_uevent_env [ 625.192905][T26483] ? ioctl_preallocate+0x210/0x210 [ 625.192921][T26483] ? __fget+0x384/0x560 [ 625.211666][T26492] kobject: 'hwsim1474' (000000001f71204b): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1474' [ 625.213247][T26483] ? ksys_dup3+0x3e0/0x3e0 [ 625.213264][T26483] ? nsecs_to_jiffies+0x30/0x30 [ 625.213284][T26483] ? tomoyo_file_ioctl+0x23/0x30 [ 625.230275][ T3891] kobject: 'loop5' (00000000429186e7): kobject_uevent_env 22:55:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 625.238364][T26483] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 625.238379][T26483] ? security_file_ioctl+0x8d/0xc0 [ 625.238396][T26483] ksys_ioctl+0xab/0xd0 [ 625.244556][T26492] kobject: 'ieee80211' (00000000c129f13a): kobject_add_internal: parent: 'hwsim1474', set: '(null)' [ 625.248159][T26483] __x64_sys_ioctl+0x73/0xb0 [ 625.248176][T26483] do_syscall_64+0xfa/0x760 [ 625.248194][T26483] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 625.248210][T26483] RIP: 0033:0x459879 [ 625.257051][T26492] kobject: 'phy1473' (00000000372ea5e4): kobject_add_internal: parent: 'ieee80211', set: 'devices' [ 625.257879][T26483] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 625.271964][ T3891] kobject: 'loop5' (00000000429186e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 625.274575][T26483] RSP: 002b:00007f25ca05dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 625.274590][T26483] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459879 [ 625.274597][T26483] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000004 [ 625.274610][T26483] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 625.288750][T26492] kobject: 'phy1473' (00000000372ea5e4): kobject_uevent_env [ 625.290614][T26483] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25ca05e6d4 [ 625.290623][T26483] R13: 00000000004c2808 R14: 00000000004d5e48 R15: 00000000ffffffff [ 625.449700][T26483] memory: usage 307200kB, limit 307200kB, failcnt 759 [ 625.462217][T26483] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 625.467423][ T3891] kobject: 'loop3' (00000000eb3aada7): kobject_uevent_env [ 625.472634][T26483] Memory cgroup stats for /syz2: [ 625.472731][T26483] anon 277037056 [ 625.472731][T26483] file 53248 [ 625.472731][T26483] kernel_stack 4915200 [ 625.472731][T26483] slab 11362304 [ 625.472731][T26483] sock 0 [ 625.472731][T26483] shmem 0 [ 625.472731][T26483] file_mapped 0 [ 625.472731][T26483] file_dirty 0 [ 625.472731][T26483] file_writeback 0 [ 625.472731][T26483] anon_thp 260046848 [ 625.472731][T26483] inactive_anon 0 [ 625.472731][T26483] active_anon 277037056 [ 625.472731][T26483] inactive_file 0 [ 625.472731][T26483] active_file 16384 [ 625.472731][T26483] unevictable 0 [ 625.472731][T26483] slab_reclaimable 1757184 [ 625.472731][T26483] slab_unreclaimable 9605120 [ 625.472731][T26483] pgfault 50094 [ 625.472731][T26483] pgmajfault 0 [ 625.472731][T26483] workingset_refault 132 [ 625.472731][T26483] workingset_activate 0 [ 625.472731][T26483] workingset_nodereclaim 0 [ 625.472731][T26483] pgrefill 548 [ 625.472731][T26483] pgscan 547 [ 625.472731][T26483] pgsteal 238 [ 625.472731][T26483] pgactivate 297 [ 625.497724][ T3891] kobject: 'loop3' (00000000eb3aada7): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 625.595438][T26483] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=26319,uid=0 [ 625.608241][ T3891] kobject: 'loop4' (00000000c0d5415c): kobject_uevent_env [ 625.618637][T26492] kobject: 'phy1473' (00000000372ea5e4): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1474/ieee80211/phy1473' [ 625.633339][ T3891] kobject: 'loop4' (00000000c0d5415c): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 625.639541][T26483] Memory cgroup out of memory: Killed process 26319 (syz-executor.2) total-vm:72972kB, anon-rss:2220kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 625.717532][T26492] kobject: 'rfkill1475' (000000007dfc9bc2): kobject_add_internal: parent: 'phy1473', set: 'devices' [ 625.728995][T26492] kobject: 'rfkill1475' (000000007dfc9bc2): kobject_uevent_env [ 625.736822][T26492] kobject: 'rfkill1475' (000000007dfc9bc2): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1474/ieee80211/phy1473/rfkill1475' [ 625.749468][T26483] kobject: 'kvm' (0000000074b76f20): kobject_uevent_env [ 625.751707][T26477] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 625.781432][T26492] ieee80211 phy1473: Selected rate control algorithm 'minstrel_ht' [ 625.782562][T26483] kobject: 'kvm' (0000000074b76f20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 625.790939][T26471] kobject: 'hwsim1475' (00000000edd9f11d): kobject_add_internal: parent: 'mac80211_hwsim', set: 'devices' [ 625.803461][T26477] CPU: 0 PID: 26477 Comm: syz-executor.2 Not tainted 5.3.0-rc6-next-20190830 #75 [ 625.819858][T26477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 625.822142][T26471] kobject: 'hwsim1475' (00000000edd9f11d): kobject_uevent_env [ 625.829918][T26477] Call Trace: [ 625.829943][T26477] dump_stack+0x172/0x1f0 [ 625.829960][T26477] dump_header+0x177/0x1152 [ 625.829971][T26477] ? ___ratelimit+0xf8/0x595 [ 625.829984][T26477] ? trace_hardirqs_on+0x67/0x240 [ 625.829996][T26477] ? pagefault_out_of_memory+0x11c/0x11c [ 625.830010][T26477] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 625.830020][T26477] ? ___ratelimit+0x60/0x595 [ 625.830031][T26477] ? do_raw_spin_unlock+0x57/0x270 [ 625.830043][T26477] oom_kill_process.cold+0x10/0x15 [ 625.830055][T26477] out_of_memory+0x334/0x1340 [ 625.830074][T26477] ? lock_downgrade+0x920/0x920 [ 625.853821][T26471] kobject: 'hwsim1475' (00000000edd9f11d): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1475' [ 625.854176][T26477] ? oom_killer_disable+0x280/0x280 [ 625.866425][ T3891] kobject: 'loop1' (0000000038d50dcd): kobject_uevent_env [ 625.870726][T26477] ? __kasan_check_read+0x11/0x20 [ 625.875322][ T3891] kobject: 'loop1' (0000000038d50dcd): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 625.880390][T26477] mem_cgroup_out_of_memory+0x1d8/0x240 [ 625.880403][T26477] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 625.880417][T26477] ? do_raw_spin_unlock+0x57/0x270 [ 625.880431][T26477] ? _raw_spin_unlock+0x2d/0x50 [ 625.880449][T26477] try_charge+0xa2d/0x1440 [ 625.885938][T26471] kobject: 'hwsim1475' (00000000edd9f11d): kobject_uevent_env [ 625.890280][T26477] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 625.890298][T26477] ? percpu_ref_tryget_live+0x111/0x290 [ 625.896876][T26471] kobject: 'hwsim1475' (00000000edd9f11d): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1475' [ 625.906756][T26477] ? get_mem_cgroup_from_mm+0x16/0x320 [ 625.906774][T26477] ? get_mem_cgroup_from_mm+0x156/0x320 [ 625.906787][T26477] mem_cgroup_try_charge+0x136/0x590 [ 625.906802][T26477] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 625.906819][T26477] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 625.917524][T26471] kobject: 'ieee80211' (000000005a3dc982): kobject_add_internal: parent: 'hwsim1475', set: '(null)' [ 625.919279][T26477] __handle_mm_fault+0x1e34/0x3f20 [ 625.919300][T26477] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 625.924380][T26471] kobject: 'phy1474' (00000000c0376730): kobject_add_internal: parent: 'ieee80211', set: 'devices' [ 625.934437][T26477] ? __kasan_check_read+0x11/0x20 [ 625.934457][T26477] ? trace_hardirqs_on+0x67/0x240 [ 625.934473][T26477] handle_mm_fault+0x1b5/0x6c0 [ 625.934489][T26477] __do_page_fault+0x536/0xdd0 [ 625.934512][T26477] do_page_fault+0x38/0x590 [ 625.953198][T26471] kobject: 'phy1474' (00000000c0376730): kobject_uevent_env [ 625.955592][T26477] page_fault+0x39/0x40 [ 625.955602][T26477] RIP: 0033:0x4111bf [ 625.955621][T26477] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 625.960145][T26471] kobject: 'phy1474' (00000000c0376730): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1475/ieee80211/phy1474' [ 625.967456][T26477] RSP: 002b:00007ffdd342e220 EFLAGS: 00010206 [ 625.967466][T26477] RAX: 00007f25ca01d000 RBX: 0000000000020000 RCX: 00000000004598ca [ 625.967473][T26477] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 625.967481][T26477] RBP: 00007ffdd342e300 R08: ffffffffffffffff R09: 0000000000000000 [ 625.967488][T26477] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffdd342e3f0 [ 625.967494][T26477] R13: 00007f25ca03d700 R14: 0000000000000002 R15: 000000000075c07c [ 625.973803][T26477] memory: usage 307008kB, limit 307200kB, failcnt 770 [ 626.044068][T26471] kobject: 'rfkill1476' (00000000ca308a75): kobject_add_internal: parent: 'phy1474', set: 'devices' [ 626.051253][T26477] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 626.056412][T26471] kobject: 'rfkill1476' (00000000ca308a75): kobject_uevent_env [ 626.064200][T26477] Memory cgroup stats for /syz2: [ 626.064296][T26477] anon 277037056 [ 626.064296][T26477] file 53248 [ 626.064296][T26477] kernel_stack 4915200 [ 626.064296][T26477] slab 11497472 [ 626.064296][T26477] sock 0 [ 626.064296][T26477] shmem 0 [ 626.064296][T26477] file_mapped 0 [ 626.064296][T26477] file_dirty 0 [ 626.064296][T26477] file_writeback 0 [ 626.064296][T26477] anon_thp 260046848 [ 626.064296][T26477] inactive_anon 0 [ 626.064296][T26477] active_anon 277037056 [ 626.064296][T26477] inactive_file 0 [ 626.064296][T26477] active_file 16384 [ 626.064296][T26477] unevictable 0 [ 626.064296][T26477] slab_reclaimable 1892352 [ 626.064296][T26477] slab_unreclaimable 9605120 [ 626.064296][T26477] pgfault 50094 [ 626.064296][T26477] pgmajfault 0 [ 626.064296][T26477] workingset_refault 132 [ 626.064296][T26477] workingset_activate 0 [ 626.064296][T26477] workingset_nodereclaim 0 [ 626.064296][T26477] pgrefill 548 [ 626.064296][T26477] pgscan 547 [ 626.064296][T26477] pgsteal 238 [ 626.064296][T26477] pgactivate 297 [ 626.067497][T26471] kobject: 'rfkill1476' (00000000ca308a75): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1475/ieee80211/phy1474/rfkill1476' [ 626.071137][T26477] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=26344,uid=0 [ 626.087925][T26471] ieee80211 phy1474: Selected rate control algorithm 'minstrel_ht' [ 626.090768][T26477] Memory cgroup out of memory: Killed process 26344 (syz-executor.2) total-vm:72972kB, anon-rss:2220kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 626.360429][ T3891] kobject: 'loop0' (00000000c5c9f182): kobject_uevent_env [ 626.368700][ T1064] oom_reaper: reaped process 26344 (syz-executor.2), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 626.384010][ T3891] kobject: 'loop0' (00000000c5c9f182): fill_kobj_path: path = '/devices/virtual/block/loop0' 22:55:33 executing program 2: syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500), 0xc, 0x0, 0x0, 0x0, 0x1b3}, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000440)={[0x0, 0x0, 0x7, 0x3, 0x0, 0x1, 0x0, 0xc9, 0x0, 0x401, 0x7], 0x10000}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYRES16=0x0, @ANYBLOB='5'], 0x2}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:55:33 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:33 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) 22:55:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 626.436767][T26477] kobject: 'kvm' (0000000074b76f20): kobject_uevent_env [ 626.443755][T26477] kobject: 'kvm' (0000000074b76f20): fill_kobj_path: path = '/devices/virtual/misc/kvm' 22:55:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) [ 626.498345][T26510] kobject: 'hwsim1476' (00000000df05a191): kobject_add_internal: parent: 'mac80211_hwsim', set: 'devices' [ 626.515989][ T3891] kobject: 'loop2' (000000006fa91856): kobject_uevent_env [ 626.523160][ T3891] kobject: 'loop2' (000000006fa91856): fill_kobj_path: path = '/devices/virtual/block/loop2' 22:55:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) 22:55:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 626.546132][T26510] kobject: 'hwsim1476' (00000000df05a191): kobject_uevent_env [ 626.568450][T26510] kobject: 'hwsim1476' (00000000df05a191): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1476' [ 626.602429][ T3891] kobject: 'loop5' (00000000429186e7): kobject_uevent_env [ 626.603631][T26525] kobject: 'kvm' (0000000074b76f20): kobject_uevent_env [ 626.633457][ T3891] kobject: 'loop5' (00000000429186e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 626.637351][T26510] kobject: 'hwsim1476' (00000000df05a191): kobject_uevent_env 22:55:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 626.658481][T26525] kobject: 'kvm' (0000000074b76f20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 626.662445][T26510] kobject: 'hwsim1476' (00000000df05a191): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1476' [ 626.687072][ T3891] kobject: 'loop3' (00000000eb3aada7): kobject_uevent_env [ 626.688803][T26510] kobject: 'ieee80211' (00000000018546b5): kobject_add_internal: parent: 'hwsim1476', set: '(null)' 22:55:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) [ 626.708757][ T3891] kobject: 'loop3' (00000000eb3aada7): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 626.710287][T26510] kobject: 'phy1475' (000000007e136309): kobject_add_internal: parent: 'ieee80211', set: 'devices' 22:55:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 626.749697][T26510] kobject: 'phy1475' (000000007e136309): kobject_uevent_env [ 626.753675][ T3891] kobject: 'loop5' (00000000429186e7): kobject_uevent_env [ 626.757775][T26510] kobject: 'phy1475' (000000007e136309): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1476/ieee80211/phy1475' [ 626.770126][ T3891] kobject: 'loop5' (00000000429186e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 626.812687][ T3891] kobject: 'loop3' (00000000eb3aada7): kobject_uevent_env [ 626.829060][ T3891] kobject: 'loop3' (00000000eb3aada7): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 626.862018][ T3891] kobject: 'loop3' (00000000eb3aada7): kobject_uevent_env [ 626.877582][ T3891] kobject: 'loop3' (00000000eb3aada7): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 626.961994][T26510] kobject: 'rfkill1477' (00000000c2140b72): kobject_add_internal: parent: 'phy1475', set: 'devices' [ 626.973579][T26510] kobject: 'rfkill1477' (00000000c2140b72): kobject_uevent_env [ 626.981966][T26510] kobject: 'rfkill1477' (00000000c2140b72): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1476/ieee80211/phy1475/rfkill1477' [ 627.012576][T26510] ieee80211 phy1475: Selected rate control algorithm 'minstrel_ht' [ 627.022799][T26518] kobject: 'hwsim1477' (000000005dc47ab5): kobject_add_internal: parent: 'mac80211_hwsim', set: 'devices' [ 627.042804][T26518] kobject: 'hwsim1477' (000000005dc47ab5): kobject_uevent_env [ 627.050826][ T3891] kobject: 'loop1' (0000000038d50dcd): kobject_uevent_env [ 627.050852][T26518] kobject: 'hwsim1477' (000000005dc47ab5): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1477' [ 627.062947][ T3891] kobject: 'loop1' (0000000038d50dcd): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 627.071212][T26518] kobject: 'hwsim1477' (000000005dc47ab5): kobject_uevent_env [ 627.088702][T26518] kobject: 'hwsim1477' (000000005dc47ab5): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1477' [ 627.106300][T26518] kobject: 'ieee80211' (00000000d29aeda8): kobject_add_internal: parent: 'hwsim1477', set: '(null)' [ 627.137878][T26518] kobject: 'phy1476' (0000000051b3ce5e): kobject_add_internal: parent: 'ieee80211', set: 'devices' [ 627.152240][T26518] kobject: 'phy1476' (0000000051b3ce5e): kobject_uevent_env [ 627.160179][T26518] kobject: 'phy1476' (0000000051b3ce5e): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1477/ieee80211/phy1476' [ 627.179607][ T3891] kobject: 'loop4' (00000000c0d5415c): kobject_uevent_env [ 627.188232][ T3891] kobject: 'loop4' (00000000c0d5415c): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 627.223961][T26518] kobject: 'rfkill1478' (000000000eb216cf): kobject_add_internal: parent: 'phy1476', set: 'devices' [ 627.234991][T26518] kobject: 'rfkill1478' (000000000eb216cf): kobject_uevent_env [ 627.242780][T26518] kobject: 'rfkill1478' (000000000eb216cf): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1477/ieee80211/phy1476/rfkill1478' [ 627.265163][T26518] ieee80211 phy1476: Selected rate control algorithm 'minstrel_ht' [ 627.276442][T26519] kobject: 'kvm' (0000000074b76f20): kobject_uevent_env 22:55:34 executing program 2: syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500), 0xc, 0x0, 0x0, 0x0, 0x1b3}, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000440)={[0x0, 0x0, 0x7, 0x3, 0x0, 0x1, 0x0, 0xc9, 0x0, 0x401, 0x7], 0x10000}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYRES16=0x0, @ANYBLOB='5'], 0x2}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:55:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) 22:55:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:34 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:34 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 627.283464][T26519] kobject: 'kvm' (0000000074b76f20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 627.301704][ T3891] kobject: 'loop0' (00000000c5c9f182): kobject_uevent_env [ 627.311919][ T3891] kobject: 'loop0' (00000000c5c9f182): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 627.365173][ T3891] kobject: 'loop2' (000000006fa91856): kobject_uevent_env [ 627.371679][T26549] kobject: 'hwsim1478' (00000000548f3b76): kobject_add_internal: parent: 'mac80211_hwsim', set: 'devices' [ 627.402376][T26549] kobject: 'hwsim1478' (00000000548f3b76): kobject_uevent_env 22:55:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) [ 627.403794][ T3891] kobject: 'loop2' (000000006fa91856): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 627.422814][T26549] kobject: 'hwsim1478' (00000000548f3b76): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1478' [ 627.449384][T26549] kobject: 'hwsim1478' (00000000548f3b76): kobject_uevent_env [ 627.467804][T26560] kobject: 'kvm' (0000000074b76f20): kobject_uevent_env [ 627.469052][T26549] kobject: 'hwsim1478' (00000000548f3b76): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1478' [ 627.474830][T26560] kobject: 'kvm' (0000000074b76f20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 627.502146][T26549] kobject: 'ieee80211' (000000002db8f615): kobject_add_internal: parent: 'hwsim1478', set: '(null)' 22:55:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 627.505145][ T3891] kobject: 'loop3' (00000000eb3aada7): kobject_uevent_env [ 627.526944][ T3891] kobject: 'loop3' (00000000eb3aada7): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 627.556464][T26549] kobject: 'phy1477' (000000003718ea99): kobject_add_internal: parent: 'ieee80211', set: 'devices' 22:55:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) 22:55:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) 22:55:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 627.563608][ T3891] kobject: 'loop5' (00000000429186e7): kobject_uevent_env [ 627.576381][T26560] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 627.584518][T26549] kobject: 'phy1477' (000000003718ea99): kobject_uevent_env [ 627.594492][T26549] kobject: 'phy1477' (000000003718ea99): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1478/ieee80211/phy1477' [ 627.604359][ T3891] kobject: 'loop5' (00000000429186e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 627.693365][ T3891] kobject: 'loop3' (00000000eb3aada7): kobject_uevent_env [ 627.707302][ T3891] kobject: 'loop3' (00000000eb3aada7): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 627.728082][ T3891] kobject: 'loop5' (00000000429186e7): kobject_uevent_env [ 627.759202][ T3891] kobject: 'loop5' (00000000429186e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 627.769538][T26549] kobject: 'rfkill1479' (00000000bd48c27a): kobject_add_internal: parent: 'phy1477', set: 'devices' [ 627.769778][T26549] kobject: 'rfkill1479' (00000000bd48c27a): kobject_uevent_env [ 627.784868][ T3891] kobject: 'loop3' (00000000eb3aada7): kobject_uevent_env [ 627.798678][T26549] kobject: 'rfkill1479' (00000000bd48c27a): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1478/ieee80211/phy1477/rfkill1479' [ 627.799711][ T3891] kobject: 'loop3' (00000000eb3aada7): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 627.833150][ T3891] kobject: 'loop5' (00000000429186e7): kobject_uevent_env [ 627.847528][ T3891] kobject: 'loop5' (00000000429186e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 627.852506][T26549] ieee80211 phy1477: Selected rate control algorithm 'minstrel_ht' [ 627.871996][ T3891] kobject: 'loop3' (00000000eb3aada7): kobject_uevent_env [ 627.874737][T26551] kobject: 'hwsim1479' (00000000c8d38621): kobject_add_internal: parent: 'mac80211_hwsim', set: 'devices' [ 627.879300][ T3891] kobject: 'loop3' (00000000eb3aada7): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 627.892166][T26551] kobject: 'hwsim1479' (00000000c8d38621): kobject_uevent_env [ 627.944148][T26551] kobject: 'hwsim1479' (00000000c8d38621): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1479' [ 627.969255][T26551] kobject: 'hwsim1479' (00000000c8d38621): kobject_uevent_env [ 627.986561][ T3891] kobject: 'loop1' (0000000038d50dcd): kobject_uevent_env [ 627.993762][ T3891] kobject: 'loop1' (0000000038d50dcd): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 628.004445][T26551] kobject: 'hwsim1479' (00000000c8d38621): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1479' [ 628.019851][T26551] kobject: 'ieee80211' (000000004357ebb6): kobject_add_internal: parent: 'hwsim1479', set: '(null)' [ 628.050778][T26551] kobject: 'phy1478' (000000001f5fcac3): kobject_add_internal: parent: 'ieee80211', set: 'devices' [ 628.075518][T26551] kobject: 'phy1478' (000000001f5fcac3): kobject_uevent_env [ 628.086816][T26551] kobject: 'phy1478' (000000001f5fcac3): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1479/ieee80211/phy1478' [ 628.161999][ T3891] kobject: 'loop4' (00000000c0d5415c): kobject_uevent_env [ 628.170626][T26551] kobject: 'rfkill1480' (000000000da519e1): kobject_add_internal: parent: 'phy1478', set: 'devices' [ 628.173970][ T3891] kobject: 'loop4' (00000000c0d5415c): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 628.183423][T26551] kobject: 'rfkill1480' (000000000da519e1): kobject_uevent_env 22:55:35 executing program 2: syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500), 0xc, 0x0, 0x0, 0x0, 0x1b3}, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000440)={[0x0, 0x0, 0x7, 0x3, 0x0, 0x1, 0x0, 0xc9, 0x0, 0x401, 0x7], 0x10000}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYRES16=0x0, @ANYBLOB='5'], 0x2}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:55:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) 22:55:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:35 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:35 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) [ 628.199790][T26551] kobject: 'rfkill1480' (000000000da519e1): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1479/ieee80211/phy1478/rfkill1480' [ 628.218759][T26555] kobject: 'kvm' (0000000074b76f20): kobject_uevent_env [ 628.225778][T26555] kobject: 'kvm' (0000000074b76f20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 628.226515][T26551] ieee80211 phy1478: Selected rate control algorithm 'minstrel_ht' 22:55:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 628.293863][T26584] kobject: 'hwsim1480' (00000000d1f4f4dc): kobject_add_internal: parent: 'mac80211_hwsim', set: 'devices' [ 628.306663][ T3891] kobject: 'loop2' (000000006fa91856): kobject_uevent_env [ 628.313831][ T3891] kobject: 'loop2' (000000006fa91856): fill_kobj_path: path = '/devices/virtual/block/loop2' 22:55:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) [ 628.363200][ T3891] kobject: 'loop0' (00000000c5c9f182): kobject_uevent_env [ 628.390643][T26594] kobject: 'kvm' (0000000074b76f20): kobject_uevent_env [ 628.396146][T26584] kobject: 'hwsim1480' (00000000d1f4f4dc): kobject_uevent_env [ 628.402257][ T3891] kobject: 'loop0' (00000000c5c9f182): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 628.405285][T26584] kobject: 'hwsim1480' (00000000d1f4f4dc): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1480' [ 628.417882][T26594] kobject: 'kvm' (0000000074b76f20): fill_kobj_path: path = '/devices/virtual/misc/kvm' 22:55:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) [ 628.456533][T26584] kobject: 'hwsim1480' (00000000d1f4f4dc): kobject_uevent_env [ 628.459623][ T3891] kobject: 'loop3' (00000000eb3aada7): kobject_uevent_env [ 628.491909][T26584] kobject: 'hwsim1480' (00000000d1f4f4dc): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1480' 22:55:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) [ 628.515904][ T3891] kobject: 'loop3' (00000000eb3aada7): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 628.525189][T26584] kobject: 'ieee80211' (0000000046fe6ca9): kobject_add_internal: parent: 'hwsim1480', set: '(null)' [ 628.548932][T26594] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 628.557754][ T3891] kobject: 'loop5' (00000000429186e7): kobject_uevent_env 22:55:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 628.573899][T26584] kobject: 'phy1479' (00000000e766ff7f): kobject_add_internal: parent: 'ieee80211', set: 'devices' [ 628.578992][ T3891] kobject: 'loop5' (00000000429186e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 628.602227][T26584] kobject: 'phy1479' (00000000e766ff7f): kobject_uevent_env [ 628.607784][ T3891] kobject: 'loop3' (00000000eb3aada7): kobject_uevent_env [ 628.621849][ T3891] kobject: 'loop3' (00000000eb3aada7): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 628.632703][T26584] kobject: 'phy1479' (00000000e766ff7f): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1480/ieee80211/phy1479' [ 628.635276][ T3891] kobject: 'loop4' (00000000c0d5415c): kobject_uevent_env [ 628.653263][ T3891] kobject: 'loop4' (00000000c0d5415c): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 628.679156][ T3891] kobject: 'loop5' (00000000429186e7): kobject_uevent_env [ 628.702182][ T3891] kobject: 'loop5' (00000000429186e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 628.730118][ T3891] kobject: 'loop3' (00000000eb3aada7): kobject_uevent_env [ 628.732723][T26584] kobject: 'rfkill1481' (00000000fe29ba7e): kobject_add_internal: parent: 'phy1479', set: 'devices' [ 628.737366][ T3891] kobject: 'loop3' (00000000eb3aada7): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 628.750759][T26584] kobject: 'rfkill1481' (00000000fe29ba7e): kobject_uevent_env [ 628.763138][ T3891] kobject: 'loop5' (00000000429186e7): kobject_uevent_env [ 628.766226][T26584] kobject: 'rfkill1481' (00000000fe29ba7e): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1480/ieee80211/phy1479/rfkill1481' [ 628.773417][ T3891] kobject: 'loop5' (00000000429186e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 628.801139][T26584] ieee80211 phy1479: Selected rate control algorithm 'minstrel_ht' [ 628.801904][ T3891] kobject: 'loop4' (00000000c0d5415c): kobject_uevent_env [ 628.812758][T26589] kobject: 'kvm' (0000000074b76f20): kobject_uevent_env [ 628.816741][T26593] kobject: 'hwsim1481' (000000007f85f18c): kobject_add_internal: parent: 'mac80211_hwsim', set: 'devices' [ 628.823742][T26589] kobject: 'kvm' (0000000074b76f20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 628.837741][ T3891] kobject: 'loop4' (00000000c0d5415c): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 628.869065][T26593] kobject: 'hwsim1481' (000000007f85f18c): kobject_uevent_env [ 628.880891][ T3891] kobject: 'loop3' (00000000eb3aada7): kobject_uevent_env [ 628.888658][ T3891] kobject: 'loop3' (00000000eb3aada7): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 628.901581][T26593] kobject: 'hwsim1481' (000000007f85f18c): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1481' [ 628.922774][T26593] kobject: 'hwsim1481' (000000007f85f18c): kobject_uevent_env 22:55:36 executing program 2: syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500), 0xc, 0x0, 0x0, 0x0, 0x1b3}, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000440)={[0x0, 0x0, 0x7, 0x3, 0x0, 0x1, 0x0, 0xc9, 0x0, 0x401, 0x7], 0x10000}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYRES16=0x0, @ANYBLOB='5'], 0x2}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:55:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) 22:55:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 22:55:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 628.923504][ T3891] kobject: 'loop1' (0000000038d50dcd): kobject_uevent_env [ 628.955978][T26593] kobject: 'hwsim1481' (000000007f85f18c): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1481' [ 628.975057][ T3891] kobject: 'loop1' (0000000038d50dcd): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 628.981941][T26593] kobject: 'ieee80211' (00000000f0ae4b6e): kobject_add_internal: parent: 'hwsim1481', set: '(null)' [ 629.002995][T26593] kobject: 'phy1480' (00000000296f82b5): kobject_add_internal: parent: 'ieee80211', set: 'devices' [ 629.034901][ T3891] kobject: 'loop2' (000000006fa91856): kobject_uevent_env [ 629.037402][T26593] kobject: 'phy1480' (00000000296f82b5): kobject_uevent_env [ 629.051246][T26622] kobject: 'kvm' (0000000074b76f20): kobject_uevent_env [ 629.058885][T26593] kobject: 'phy1480' (00000000296f82b5): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1481/ieee80211/phy1480' [ 629.071367][ T3891] kobject: 'loop2' (000000006fa91856): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 629.093993][T26622] kobject: 'kvm' (0000000074b76f20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 629.110513][ T3891] kobject: 'loop5' (00000000429186e7): kobject_uevent_env [ 629.120024][ T3891] kobject: 'loop5' (00000000429186e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 629.126252][T26593] kobject: 'rfkill1482' (00000000c0e2d670): kobject_add_internal: parent: 'phy1480', set: 'devices' [ 629.141759][T26593] kobject: 'rfkill1482' (00000000c0e2d670): kobject_uevent_env [ 629.144516][ T3891] kobject: 'loop4' (00000000c0d5415c): kobject_uevent_env [ 629.152882][T26593] kobject: 'rfkill1482' (00000000c0e2d670): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1481/ieee80211/phy1480/rfkill1482' [ 629.167419][ T3891] kobject: 'loop4' (00000000c0d5415c): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 629.184016][T26593] ieee80211 phy1480: Selected rate control algorithm 'minstrel_ht' 22:55:36 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:36 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) recvmsg(r0, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) 22:55:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 629.201873][T26618] kobject: 'kvm' (0000000074b76f20): kobject_uevent_env [ 629.216041][T26618] kobject: 'kvm' (0000000074b76f20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 629.273606][ T3891] kobject: 'loop0' (00000000c5c9f182): kobject_uevent_env [ 629.297967][T26636] kobject: 'hwsim1482' (000000001f694d4a): kobject_add_internal: parent: 'mac80211_hwsim', set: 'devices' 22:55:36 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) recvmsg(r0, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) [ 629.328084][ T3891] kobject: 'loop0' (00000000c5c9f182): fill_kobj_path: path = '/devices/virtual/block/loop0' 22:55:36 executing program 2: syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500), 0xc, 0x0, 0x0, 0x0, 0x1b3}, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000440)={[0x0, 0x0, 0x7, 0x3, 0x0, 0x1, 0x0, 0xc9, 0x0, 0x401, 0x7], 0x10000}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYRES16=0x0, @ANYBLOB='5'], 0x2}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:55:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 629.368898][T26636] kobject: 'hwsim1482' (000000001f694d4a): kobject_uevent_env [ 629.423528][T26636] kobject: 'hwsim1482' (000000001f694d4a): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1482' [ 629.453651][ T3891] kobject: 'loop2' (000000006fa91856): kobject_uevent_env 22:55:36 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) recvmsg(r0, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) [ 629.511250][ T3891] kobject: 'loop2' (000000006fa91856): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 629.530175][T26636] kobject: 'hwsim1482' (000000001f694d4a): kobject_uevent_env [ 629.542579][T26636] kobject: 'hwsim1482' (000000001f694d4a): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1482' 22:55:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 629.606328][T26636] kobject: 'ieee80211' (00000000e68c57bf): kobject_add_internal: parent: 'hwsim1482', set: '(null)' [ 629.617279][T26647] syz-executor.2 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 629.667381][ T3891] kobject: 'loop3' (00000000eb3aada7): kobject_uevent_env [ 629.675230][ T3891] kobject: 'loop3' (00000000eb3aada7): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 629.689813][T26636] kobject: 'phy1481' (0000000079a09061): kobject_add_internal: parent: 'ieee80211', set: 'devices' [ 629.706737][T26647] CPU: 0 PID: 26647 Comm: syz-executor.2 Not tainted 5.3.0-rc6-next-20190830 #75 22:55:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) [ 629.715879][T26647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 629.726026][T26647] Call Trace: [ 629.729331][T26647] dump_stack+0x172/0x1f0 [ 629.733677][T26647] dump_header+0x177/0x1152 [ 629.738195][T26647] ? ___ratelimit+0xf8/0x595 [ 629.742796][T26647] ? trace_hardirqs_on+0x67/0x240 [ 629.747833][T26647] ? pagefault_out_of_memory+0x11c/0x11c [ 629.753481][T26647] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 629.758836][ T3891] kobject: 'loop5' (00000000429186e7): kobject_uevent_env [ 629.759293][T26647] ? ___ratelimit+0x60/0x595 [ 629.770133][ T3891] kobject: 'loop5' (00000000429186e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 629.770964][T26647] ? do_raw_spin_unlock+0x57/0x270 [ 629.786214][T26647] oom_kill_process.cold+0x10/0x15 [ 629.791334][T26647] out_of_memory+0x334/0x1340 [ 629.796033][T26647] ? lock_downgrade+0x920/0x920 [ 629.800896][T26647] ? oom_killer_disable+0x280/0x280 [ 629.806118][T26647] mem_cgroup_out_of_memory+0x1d8/0x240 22:55:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) [ 629.806889][T26636] kobject: 'phy1481' (0000000079a09061): kobject_uevent_env [ 629.811664][T26647] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 629.811682][T26647] ? do_raw_spin_unlock+0x57/0x270 [ 629.811702][T26647] ? _raw_spin_unlock+0x2d/0x50 [ 629.827909][T26636] kobject: 'phy1481' (0000000079a09061): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1482/ieee80211/phy1481' [ 629.829694][T26647] try_charge+0xf4b/0x1440 [ 629.829717][T26647] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 629.829736][T26647] ? get_mem_cgroup_from_mm+0x139/0x320 [ 629.863067][T26647] ? __kasan_check_read+0x11/0x20 [ 629.868105][T26647] ? lock_downgrade+0x920/0x920 [ 629.872974][T26647] ? percpu_ref_tryget_live+0x111/0x290 [ 629.878537][T26647] __memcg_kmem_charge_memcg+0x71/0xf0 [ 629.884004][T26647] ? memcg_kmem_put_cache+0x50/0x50 [ 629.889225][T26647] ? get_mem_cgroup_from_mm+0x156/0x320 [ 629.894788][T26647] __memcg_kmem_charge+0x13a/0x3a0 [ 629.899915][T26647] __alloc_pages_nodemask+0x4f7/0x900 [ 629.905297][T26647] ? __alloc_pages_slowpath+0x2540/0x2540 [ 629.911028][T26647] ? percpu_ref_put_many+0xb6/0x190 [ 629.916241][T26647] ? trace_hardirqs_on+0x67/0x240 [ 629.921278][T26647] copy_process+0x3f8/0x6830 [ 629.925880][T26647] ? psi_memstall_leave+0x12e/0x180 [ 629.931086][T26647] ? __kasan_check_read+0x11/0x20 [ 629.936128][T26647] ? record_times+0x1e/0x2b0 [ 629.936336][ T3891] kobject: 'loop5' (00000000429186e7): kobject_uevent_env [ 629.940719][T26647] ? __cleanup_sighand+0x60/0x60 [ 629.952821][T26647] ? debug_smp_processor_id+0x3c/0x214 [ 629.958289][T26647] ? __lockdep_free_key_range+0x120/0x120 [ 629.958418][ T3891] kobject: 'loop5' (00000000429186e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 629.964006][T26647] _do_fork+0x146/0xfa0 [ 629.964022][T26647] ? copy_init_mm+0x20/0x20 [ 629.964037][T26647] ? __kasan_check_read+0x11/0x20 [ 629.964051][T26647] ? lock_downgrade+0x920/0x920 [ 629.964070][T26647] ? percpu_ref_tryget_live+0x290/0x290 [ 629.981548][T26636] kobject: 'rfkill1483' (0000000077ade171): kobject_add_internal: parent: 'phy1481', set: 'devices' [ 629.983090][T26647] __x64_sys_clone+0x1ab/0x270 [ 629.983113][T26647] ? __ia32_sys_vfork+0xd0/0xd0 [ 629.983128][T26647] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 629.983150][T26647] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 629.988616][T26636] kobject: 'rfkill1483' (0000000077ade171): kobject_uevent_env [ 629.993004][T26647] ? trace_hardirqs_off_caller+0x65/0x230 [ 629.993018][T26647] ? trace_hardirqs_on+0x67/0x240 [ 629.993036][T26647] do_syscall_64+0xfa/0x760 [ 629.993053][T26647] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 629.993067][T26647] RIP: 0033:0x45c249 [ 630.015106][T26636] kobject: 'rfkill1483' (0000000077ade171): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1482/ieee80211/phy1481/rfkill1483' [ 630.018941][T26647] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 630.018948][T26647] RSP: 002b:00007ffdd342e1d8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 630.018959][T26647] RAX: ffffffffffffffda RBX: 00007f25ca03d700 RCX: 000000000045c249 [ 630.018965][T26647] RDX: 00007f25ca03d9d0 RSI: 00007f25ca03cdb0 RDI: 00000000003d0f00 [ 630.018971][T26647] RBP: 00007ffdd342e3f0 R08: 00007f25ca03d700 R09: 00007f25ca03d700 [ 630.018979][T26647] R10: 00007f25ca03d9d0 R11: 0000000000000202 R12: 0000000000000000 [ 630.018987][T26647] R13: 00007ffdd342e28f R14: 00007f25ca03d9c0 R15: 000000000075c07c [ 630.029043][T26647] memory: usage 307200kB, limit 307200kB, failcnt 820 [ 630.071546][T26636] ieee80211 phy1481: Selected rate control algorithm 'minstrel_ht' [ 630.081892][T26647] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 630.149836][ T3891] kobject: 'loop3' (00000000eb3aada7): kobject_uevent_env [ 630.154437][T26647] Memory cgroup stats for /syz2: [ 630.154534][T26647] anon 274649088 [ 630.154534][T26647] file 53248 [ 630.154534][T26647] kernel_stack 4849664 [ 630.154534][T26647] slab 14127104 [ 630.154534][T26647] sock 0 [ 630.154534][T26647] shmem 0 [ 630.154534][T26647] file_mapped 0 [ 630.154534][T26647] file_dirty 0 [ 630.154534][T26647] file_writeback 0 [ 630.154534][T26647] anon_thp 257949696 [ 630.154534][T26647] inactive_anon 0 [ 630.154534][T26647] active_anon 274649088 [ 630.154534][T26647] inactive_file 0 [ 630.154534][T26647] active_file 16384 [ 630.154534][T26647] unevictable 0 [ 630.154534][T26647] slab_reclaimable 2162688 [ 630.154534][T26647] slab_unreclaimable 11964416 [ 630.154534][T26647] pgfault 50457 [ 630.154534][T26647] pgmajfault 0 [ 630.154534][T26647] workingset_refault 132 [ 630.154534][T26647] workingset_activate 0 [ 630.154534][T26647] workingset_nodereclaim 0 [ 630.154534][T26647] pgrefill 548 [ 630.154534][T26647] pgscan 580 [ 630.154534][T26647] pgsteal 238 [ 630.161697][T26639] kobject: 'hwsim1483' (00000000a33fcec0): kobject_add_internal: parent: 'mac80211_hwsim', set: 'devices' [ 630.171298][T26647] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=25347,uid=0 [ 630.184385][ T3891] kobject: 'loop3' (00000000eb3aada7): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 630.268779][T26647] Memory cgroup out of memory: Killed process 25347 (syz-executor.2) total-vm:72576kB, anon-rss:2196kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 630.280782][T26639] kobject: 'hwsim1483' (00000000a33fcec0): kobject_uevent_env [ 630.333471][T26639] kobject: 'hwsim1483' (00000000a33fcec0): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1483' [ 630.340071][T26652] syz-executor.2 invoked oom-killer: gfp_mask=0x40cd0(GFP_KERNEL|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=1000 [ 630.354170][ T3891] kobject: 'loop4' (00000000c0d5415c): kobject_uevent_env [ 630.365563][ T3891] kobject: 'loop4' (00000000c0d5415c): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 630.373643][T26652] CPU: 0 PID: 26652 Comm: syz-executor.2 Not tainted 5.3.0-rc6-next-20190830 #75 [ 630.383119][T26639] kobject: 'hwsim1483' (00000000a33fcec0): kobject_uevent_env [ 630.384850][T26652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 630.393954][ T3891] kobject: 'loop1' (0000000038d50dcd): kobject_uevent_env [ 630.402418][T26652] Call Trace: [ 630.402439][T26652] dump_stack+0x172/0x1f0 [ 630.402455][T26652] dump_header+0x177/0x1152 [ 630.402466][T26652] ? ___ratelimit+0xf8/0x595 [ 630.402480][T26652] ? trace_hardirqs_on+0x67/0x240 [ 630.402492][T26652] ? pagefault_out_of_memory+0x11c/0x11c [ 630.402513][T26652] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 630.410210][T26639] kobject: 'hwsim1483' (00000000a33fcec0): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1483' [ 630.412909][T26652] ? ___ratelimit+0x60/0x595 [ 630.412920][T26652] ? do_raw_spin_unlock+0x57/0x270 [ 630.412938][T26652] oom_kill_process.cold+0x10/0x15 [ 630.417624][ T3891] kobject: 'loop1' (0000000038d50dcd): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 630.421733][T26652] out_of_memory+0x334/0x1340 [ 630.421753][T26652] ? lock_downgrade+0x920/0x920 [ 630.427048][T26639] kobject: 'ieee80211' (000000009bc65208): kobject_add_internal: parent: 'hwsim1483', set: '(null)' [ 630.431589][T26652] ? oom_killer_disable+0x280/0x280 [ 630.431602][T26652] ? __kasan_check_read+0x11/0x20 [ 630.431622][T26652] mem_cgroup_out_of_memory+0x1d8/0x240 [ 630.462541][T26639] kobject: 'phy1482' (0000000009bc97de): kobject_add_internal: parent: 'ieee80211', set: 'devices' [ 630.464307][T26652] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 630.464326][T26652] ? do_raw_spin_unlock+0x57/0x270 [ 630.470167][T26639] kobject: 'phy1482' (0000000009bc97de): kobject_uevent_env [ 630.479559][T26652] ? _raw_spin_unlock+0x2d/0x50 [ 630.479577][T26652] try_charge+0xa2d/0x1440 [ 630.479595][T26652] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 630.479614][T26652] ? cache_grow_begin+0x122/0xd20 [ 630.485110][T26639] kobject: 'phy1482' (0000000009bc97de): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1483/ieee80211/phy1482' [ 630.489106][T26652] ? __kasan_check_read+0x11/0x20 [ 630.489126][T26652] __memcg_kmem_charge_memcg+0x71/0xf0 [ 630.489139][T26652] ? memcg_kmem_put_cache+0x50/0x50 [ 630.489150][T26652] ? cache_grow_begin+0x70b/0xd20 [ 630.489165][T26652] cache_grow_begin+0x629/0xd20 [ 630.489185][T26652] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 630.543740][T26639] kobject: 'rfkill1484' (000000009a144c74): kobject_add_internal: parent: 'phy1482', set: 'devices' [ 630.544239][T26652] ? mempolicy_slab_node+0x139/0x390 [ 630.549505][T26639] kobject: 'rfkill1484' (000000009a144c74): kobject_uevent_env [ 630.553469][T26652] fallback_alloc+0x1fd/0x2d0 [ 630.553485][T26652] ____cache_alloc_node+0x1bc/0x1d0 [ 630.559614][T26639] kobject: 'rfkill1484' (000000009a144c74): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1483/ieee80211/phy1482/rfkill1484' [ 630.564014][T26652] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 630.564032][T26652] kmem_cache_alloc+0x1ef/0x710 [ 630.589207][T26639] ieee80211 phy1482: Selected rate control algorithm 'minstrel_ht' [ 630.592698][T26652] alloc_inode+0x16f/0x1e0 [ 630.679152][T26652] new_inode_pseudo+0x19/0xf0 [ 630.683827][T26652] new_inode+0x1f/0x40 [ 630.687895][T26652] debugfs_get_inode+0x1a/0x130 [ 630.692738][T26652] __debugfs_create_file+0xb7/0x3f0 [ 630.697992][T26652] debugfs_create_file+0x5a/0x70 [ 630.702927][T26652] kvm_dev_ioctl+0xa04/0x1650 [ 630.707610][T26652] ? kvm_debugfs_release+0x90/0x90 [ 630.712704][T26652] ? kvm_debugfs_release+0x90/0x90 [ 630.717817][T26652] do_vfs_ioctl+0xdb6/0x13e0 [ 630.722389][T26652] ? ioctl_preallocate+0x210/0x210 [ 630.727493][T26652] ? __fget+0x384/0x560 [ 630.731631][T26652] ? ksys_dup3+0x3e0/0x3e0 [ 630.736042][T26652] ? nsecs_to_jiffies+0x30/0x30 [ 630.740889][T26652] ? tomoyo_file_ioctl+0x23/0x30 [ 630.745811][T26652] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 630.752041][T26652] ? security_file_ioctl+0x8d/0xc0 [ 630.757236][T26652] ksys_ioctl+0xab/0xd0 [ 630.761376][T26652] __x64_sys_ioctl+0x73/0xb0 [ 630.765953][T26652] do_syscall_64+0xfa/0x760 [ 630.770441][T26652] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 630.776323][T26652] RIP: 0033:0x459879 [ 630.780210][T26652] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 630.799885][T26652] RSP: 002b:00007f25ca05dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 630.808297][T26652] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459879 22:55:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) 22:55:37 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) [ 630.816250][T26652] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000004 [ 630.824375][T26652] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 630.832327][T26652] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25ca05e6d4 [ 630.840282][T26652] R13: 00000000004c2808 R14: 00000000004d5e48 R15: 00000000ffffffff [ 630.851829][T26652] memory: usage 304976kB, limit 307200kB, failcnt 820 [ 630.854625][ T3891] kobject: 'loop0' (00000000c5c9f182): kobject_uevent_env [ 630.858661][T26652] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 630.858665][T26652] Memory cgroup stats for /syz2: [ 630.858774][T26652] anon 272609280 [ 630.858774][T26652] file 53248 [ 630.858774][T26652] kernel_stack 4849664 [ 630.858774][T26652] slab 14127104 [ 630.858774][T26652] sock 0 [ 630.858774][T26652] shmem 0 [ 630.858774][T26652] file_mapped 0 [ 630.858774][T26652] file_dirty 0 [ 630.858774][T26652] file_writeback 0 [ 630.858774][T26652] anon_thp 255852544 [ 630.858774][T26652] inactive_anon 0 [ 630.858774][T26652] active_anon 272609280 [ 630.858774][T26652] inactive_file 0 [ 630.858774][T26652] active_file 16384 [ 630.858774][T26652] unevictable 0 [ 630.858774][T26652] slab_reclaimable 2162688 [ 630.858774][T26652] slab_unreclaimable 11964416 [ 630.858774][T26652] pgfault 50457 [ 630.858774][T26652] pgmajfault 0 [ 630.858774][T26652] workingset_refault 132 [ 630.858774][T26652] workingset_activate 0 [ 630.858774][T26652] workingset_nodereclaim 0 [ 630.858774][T26652] pgrefill 548 [ 630.858774][T26652] pgscan 580 [ 630.858774][T26652] pgsteal 238 22:55:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) [ 630.902027][ T3891] kobject: 'loop0' (00000000c5c9f182): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 630.984319][T26682] kobject: 'hwsim1484' (00000000174c2162): kobject_add_internal: parent: 'mac80211_hwsim', set: 'devices' [ 631.017799][T26682] kobject: 'hwsim1484' (00000000174c2162): kobject_uevent_env [ 631.051283][T26682] kobject: 'hwsim1484' (00000000174c2162): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1484' [ 631.067851][ T3891] kobject: 'loop5' (00000000429186e7): kobject_uevent_env [ 631.068352][T26682] kobject: 'hwsim1484' (00000000174c2162): kobject_uevent_env [ 631.081007][ T3891] kobject: 'loop5' (00000000429186e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 631.085500][T26682] kobject: 'hwsim1484' (00000000174c2162): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1484' [ 631.106984][ T3891] kobject: 'loop3' (00000000eb3aada7): kobject_uevent_env [ 631.109956][T26682] kobject: 'ieee80211' (00000000f9636767): kobject_add_internal: parent: 'hwsim1484', set: '(null)' [ 631.114387][ T3891] kobject: 'loop3' (00000000eb3aada7): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 631.125694][T26682] kobject: 'phy1483' (00000000ef668563): kobject_add_internal: parent: 'ieee80211', set: 'devices' [ 631.137124][ T3891] kobject: 'loop5' (00000000429186e7): kobject_uevent_env [ 631.150179][T26682] kobject: 'phy1483' (00000000ef668563): kobject_uevent_env [ 631.153621][ T3891] kobject: 'loop5' (00000000429186e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 631.161375][T26682] kobject: 'phy1483' (00000000ef668563): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1484/ieee80211/phy1483' [ 631.192283][T26652] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=25294,uid=0 [ 631.243679][T26652] Memory cgroup out of memory: Killed process 25294 (syz-executor.2) total-vm:72576kB, anon-rss:2196kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 631.273465][T26652] kobject: 'kvm' (0000000074b76f20): kobject_uevent_env [ 631.299666][T26652] kobject: 'kvm' (0000000074b76f20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 631.340968][T26682] kobject: 'rfkill1485' (00000000f9b8f04e): kobject_add_internal: parent: 'phy1483', set: 'devices' [ 631.353871][T26652] kobject: 'kvm' (0000000074b76f20): kobject_uevent_env [ 631.356281][T26682] kobject: 'rfkill1485' (00000000f9b8f04e): kobject_uevent_env [ 631.361191][T26652] kobject: 'kvm' (0000000074b76f20): fill_kobj_path: path = '/devices/virtual/misc/kvm' 22:55:38 executing program 2: syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500), 0xc, 0x0, 0x0, 0x0, 0x1b3}, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000440)={[0x0, 0x0, 0x7, 0x3, 0x0, 0x1, 0x0, 0xc9, 0x0, 0x401, 0x7], 0x10000}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYRES16=0x0, @ANYBLOB='5'], 0x2}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:55:38 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) [ 631.369628][T26682] kobject: 'rfkill1485' (00000000f9b8f04e): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1484/ieee80211/phy1483/rfkill1485' 22:55:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) [ 631.415602][T26682] ieee80211 phy1483: Selected rate control algorithm 'minstrel_ht' [ 631.431653][ T3891] kobject: 'loop2' (000000006fa91856): kobject_uevent_env [ 631.439222][T26684] kobject: 'hwsim1485' (000000004b04af33): kobject_add_internal: parent: 'mac80211_hwsim', set: 'devices' [ 631.457315][ T3891] kobject: 'loop2' (000000006fa91856): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 631.476360][ T3891] kobject: 'loop5' (00000000429186e7): kobject_uevent_env [ 631.485000][T26684] kobject: 'hwsim1485' (000000004b04af33): kobject_uevent_env 22:55:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) [ 631.506572][ T3891] kobject: 'loop5' (00000000429186e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 631.521828][T26684] kobject: 'hwsim1485' (000000004b04af33): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1485' [ 631.538736][T26701] kobject: 'kvm' (0000000074b76f20): kobject_uevent_env [ 631.545739][T26701] kobject: 'kvm' (0000000074b76f20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 631.554906][T26684] kobject: 'hwsim1485' (000000004b04af33): kobject_uevent_env [ 631.577286][ T3891] kobject: 'loop5' (00000000429186e7): kobject_uevent_env [ 631.595700][ T3891] kobject: 'loop5' (00000000429186e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 631.598185][T26684] kobject: 'hwsim1485' (000000004b04af33): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1485' [ 631.620218][ T3891] kobject: 'loop3' (00000000eb3aada7): kobject_uevent_env [ 631.638736][ T3891] kobject: 'loop3' (00000000eb3aada7): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 631.665550][T26684] kobject: 'ieee80211' (000000009c28edef): kobject_add_internal: parent: 'hwsim1485', set: '(null)' [ 631.682311][ T3891] kobject: 'loop1' (0000000038d50dcd): kobject_uevent_env [ 631.696024][T26684] kobject: 'phy1484' (00000000ffca1efc): kobject_add_internal: parent: 'ieee80211', set: 'devices' [ 631.719365][ T3891] kobject: 'loop1' (0000000038d50dcd): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 631.723216][T26684] kobject: 'phy1484' (00000000ffca1efc): kobject_uevent_env [ 631.752203][T26684] kobject: 'phy1484' (00000000ffca1efc): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1485/ieee80211/phy1484' [ 631.814246][ T3891] kobject: 'loop4' (00000000c0d5415c): kobject_uevent_env [ 631.823149][ T3891] kobject: 'loop4' (00000000c0d5415c): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 631.863680][T26684] kobject: 'rfkill1486' (0000000080987429): kobject_add_internal: parent: 'phy1484', set: 'devices' [ 631.874987][T26684] kobject: 'rfkill1486' (0000000080987429): kobject_uevent_env [ 631.882745][T26684] kobject: 'rfkill1486' (0000000080987429): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1485/ieee80211/phy1484/rfkill1486' [ 631.905962][T26684] ieee80211 phy1484: Selected rate control algorithm 'minstrel_ht' 22:55:39 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) 22:55:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 631.916851][T26704] kobject: 'hwsim1486' (0000000071b7a7ad): kobject_add_internal: parent: 'mac80211_hwsim', set: 'devices' [ 631.943634][T26696] kobject: 'kvm' (0000000074b76f20): kobject_uevent_env [ 631.954741][T26696] kobject: 'kvm' (0000000074b76f20): fill_kobj_path: path = '/devices/virtual/misc/kvm' 22:55:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) [ 631.965976][ T3891] kobject: 'loop0' (00000000c5c9f182): kobject_uevent_env [ 631.973145][ T3891] kobject: 'loop0' (00000000c5c9f182): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 631.987930][T26704] kobject: 'hwsim1486' (0000000071b7a7ad): kobject_uevent_env [ 632.005632][T26704] kobject: 'hwsim1486' (0000000071b7a7ad): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1486' 22:55:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 632.026182][T26704] kobject: 'hwsim1486' (0000000071b7a7ad): kobject_uevent_env [ 632.046434][T26704] kobject: 'hwsim1486' (0000000071b7a7ad): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1486' [ 632.049825][ T3891] kobject: 'loop5' (00000000429186e7): kobject_uevent_env 22:55:39 executing program 2: syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500), 0xc, 0x0, 0x0, 0x0, 0x1b3}, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000440)={[0x0, 0x0, 0x7, 0x3, 0x0, 0x1, 0x0, 0xc9, 0x0, 0x401, 0x7], 0x10000}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYRES16=0x0, @ANYBLOB='5'], 0x2}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 632.086600][T26704] kobject: 'ieee80211' (000000005f5dd292): kobject_add_internal: parent: 'hwsim1486', set: '(null)' [ 632.107859][T26704] kobject: 'phy1485' (0000000034864cbe): kobject_add_internal: parent: 'ieee80211', set: 'devices' [ 632.112755][ T3891] kobject: 'loop5' (00000000429186e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 632.119609][T26704] kobject: 'phy1485' (0000000034864cbe): kobject_uevent_env 22:55:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) 22:55:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 632.150430][T26704] kobject: 'phy1485' (0000000034864cbe): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1486/ieee80211/phy1485' [ 632.189005][ T3891] kobject: 'loop3' (00000000eb3aada7): kobject_uevent_env 22:55:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) [ 632.208635][ T3891] kobject: 'loop3' (00000000eb3aada7): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 632.254021][T26732] kobject: 'kvm' (0000000074b76f20): kobject_uevent_env [ 632.264251][ T3891] kobject: 'loop2' (000000006fa91856): kobject_uevent_env [ 632.293591][ T3891] kobject: 'loop2' (000000006fa91856): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 632.311312][T26704] kobject: 'rfkill1487' (0000000095299d8d): kobject_add_internal: parent: 'phy1485', set: 'devices' [ 632.318170][T26732] kobject: 'kvm' (0000000074b76f20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 632.332015][T26704] kobject: 'rfkill1487' (0000000095299d8d): kobject_uevent_env [ 632.338867][ T3891] kobject: 'loop5' (00000000429186e7): kobject_uevent_env [ 632.352964][ T3891] kobject: 'loop5' (00000000429186e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 632.354968][T26704] kobject: 'rfkill1487' (0000000095299d8d): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1486/ieee80211/phy1485/rfkill1487' [ 632.379327][ T3891] kobject: 'loop3' (00000000eb3aada7): kobject_uevent_env [ 632.393263][ T3891] kobject: 'loop3' (00000000eb3aada7): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 632.435096][ T3891] kobject: 'loop5' (00000000429186e7): kobject_uevent_env [ 632.439446][T26704] ieee80211 phy1485: Selected rate control algorithm 'minstrel_ht' [ 632.450388][ T3891] kobject: 'loop5' (00000000429186e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 632.455033][T26721] kobject: 'hwsim1487' (00000000254bf667): kobject_add_internal: parent: 'mac80211_hwsim', set: 'devices' [ 632.472128][ T3891] kobject: 'loop3' (00000000eb3aada7): kobject_uevent_env 22:55:39 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 632.479791][ T3891] kobject: 'loop3' (00000000eb3aada7): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 632.489761][T26721] kobject: 'hwsim1487' (00000000254bf667): kobject_uevent_env [ 632.491947][ T3891] kobject: 'loop5' (00000000429186e7): kobject_uevent_env [ 632.502810][T26721] kobject: 'hwsim1487' (00000000254bf667): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1487' [ 632.505220][ T3891] kobject: 'loop5' (00000000429186e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 632.543716][T26721] kobject: 'hwsim1487' (00000000254bf667): kobject_uevent_env [ 632.553907][ T3891] kobject: 'loop1' (0000000038d50dcd): kobject_uevent_env [ 632.554479][T26721] kobject: 'hwsim1487' (00000000254bf667): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1487' [ 632.570536][ T3891] kobject: 'loop1' (0000000038d50dcd): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 632.577603][T26721] kobject: 'ieee80211' (0000000016bab854): kobject_add_internal: parent: 'hwsim1487', set: '(null)' [ 632.601907][T26721] kobject: 'phy1486' (000000001322ceb8): kobject_add_internal: parent: 'ieee80211', set: 'devices' [ 632.653028][T26721] kobject: 'phy1486' (000000001322ceb8): kobject_uevent_env [ 632.690779][T26721] kobject: 'phy1486' (000000001322ceb8): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1487/ieee80211/phy1486' [ 632.797024][ T3891] kobject: 'loop4' (00000000c0d5415c): kobject_uevent_env [ 632.804323][ T3891] kobject: 'loop4' (00000000c0d5415c): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 632.859873][T26721] kobject: 'rfkill1488' (00000000cb96ed54): kobject_add_internal: parent: 'phy1486', set: 'devices' [ 632.871991][T26721] kobject: 'rfkill1488' (00000000cb96ed54): kobject_uevent_env [ 632.879919][T26721] kobject: 'rfkill1488' (00000000cb96ed54): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1487/ieee80211/phy1486/rfkill1488' [ 632.903617][T26721] ieee80211 phy1486: Selected rate control algorithm 'minstrel_ht' [ 632.914327][T26741] kobject: 'hwsim1488' (000000007d2be407): kobject_add_internal: parent: 'mac80211_hwsim', set: 'devices' [ 632.916413][T26726] kobject: 'kvm' (0000000074b76f20): kobject_uevent_env [ 632.936503][T26741] kobject: 'hwsim1488' (000000007d2be407): kobject_uevent_env [ 632.936631][T26726] kobject: 'kvm' (0000000074b76f20): fill_kobj_path: path = '/devices/virtual/misc/kvm' 22:55:40 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x18, 0x23, 0x829, 0x0, 0x0, {0x4}, [@typed={0x4, 0x12, @binary}]}, 0x18}}, 0x0) 22:55:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) 22:55:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 22:55:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 632.944024][T26741] kobject: 'hwsim1488' (000000007d2be407): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1488' [ 632.944214][T26741] kobject: 'hwsim1488' (000000007d2be407): kobject_uevent_env [ 632.976002][T26741] kobject: 'hwsim1488' (000000007d2be407): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim1488' [ 632.982735][ T3891] kobject: 'loop0' (00000000c5c9f182): kobject_uevent_env [ 632.988072][T26741] kobject: 'ieee80211' (00000000360aacab): kobject_add_internal: parent: 'hwsim1488', set: '(null)' 22:55:40 executing program 2: syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500), 0xc, 0x0, 0x0, 0x0, 0x1b3}, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000440)={[0x0, 0x0, 0x7, 0x3, 0x0, 0x1, 0x0, 0xc9, 0x0, 0x401, 0x7], 0x10000}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYRES16=0x0, @ANYBLOB='5'], 0x2}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 633.013226][ T3891] kobject: 'loop0' (00000000c5c9f182): fill_kobj_path: path = '/devices/virtual/block/loop0' 22:55:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bi